[sqlmap-users] Unhandled Exception while Banner Grabbing
Brought to you by:
inquisb
|
From: Daniel H. <san...@gm...> - 2010-02-28 09:24:13
|
Running SVN revision 1347 (latest) and using the most up to date XML
versions file. System environment is as follows:
Python 2.6.4 (r264:75706, Dec 7 2009, 18:45:15) [GCC 4.4.1] on linux2
Ubuntu 9.10 (Karmic - x86/32bit) 2.6.31-19-generic
The initial enumeration without banner grabbing, returns and then confirms
that the DBMS is Microsoft SQL server (expected behaviour). However running
any subsequent operations (including -f and/or -b) returns:
[00:35:51] [ERROR] sqlmap was not able to fingerprint the back-end database
management system. Support for this DBMS will be implemented if you ask,
just drop us an email
If I erase the output folder for that scan, it works once again, but only
for the first scan. However if I erase the output folder, and then try to
banner grab, the following happens:
sbit@hati:/opt/sqlmap$ ./sqlmap.py -u
"http://www.[REDACTED].com/[REDACTED].asp?[REDACTED]=[REDACTED]"
-f --banner
sqlmap/0.8-rc7 - automatic SQL injection and database takeover tool
http://sqlmap.sourceforge.net
[*] starting at: 00:40:16
[00:40:16] [INFO] using '/opt/sqlmap/output/www.[REDACTED].com/session' as
session file
[00:40:16] [INFO] testing connection to the target url
[00:40:17] [INFO] testing if the url is stable, wait a few seconds
[00:40:19] [INFO] url is stable
[00:40:19] [INFO] testing if User-Agent parameter 'User-Agent' is dynamic
[00:40:20] [WARNING] User-Agent parameter 'User-Agent' is not dynamic
[00:40:20] [INFO] testing if Cookie parameter 'ASPSESSIONIDCSCDTATD' is
dynamic
[00:40:21] [WARNING] Cookie parameter 'ASPSESSIONIDCSCDTATD' is not dynamic
[00:40:21] [INFO] testing if GET parameter '[REDACTED]' is dynamic
[00:40:21] [INFO] confirming that GET parameter '[REDACTED]' is dynamic
[00:40:22] [INFO] GET parameter '[REDACTED]' is dynamic
[00:40:22] [INFO] testing sql injection on GET parameter '[REDACTED]' with 0
parenthesis
[00:40:22] [INFO] testing unescaped numeric injection on GET parameter
'[REDACTED]'
[00:40:22] [INFO] GET parameter '[REDACTED]' is not unescaped numeric
injectable
[00:40:22] [INFO] testing single quoted string injection on GET parameter
'[REDACTED]'
[00:40:23] [INFO] confirming single quoted string injection on GET parameter
'[REDACTED]'
[00:40:24] [INFO] GET parameter '[REDACTED]' is single quoted string
injectable with 0 parenthesis
[00:40:24] [INFO] testing for parenthesis on injectable parameter
[00:40:28] [INFO] the injectable parameter requires 0 parenthesis
[00:40:28] [INFO] testing MySQL
[00:40:28] [WARNING] the back-end DMBS is not MySQL
[00:40:28] [INFO] testing Oracle
[00:40:28] [WARNING] the back-end DMBS is not Oracle
[00:40:28] [INFO] testing PostgreSQL
[00:40:28] [WARNING] the back-end DMBS is not PostgreSQL
[00:40:28] [INFO] testing Microsoft SQL Server
[00:40:29] [INFO] confirming Microsoft SQL Server
[00:40:34] [INFO] the back-end DBMS is Microsoft SQL Server
[00:40:34] [INFO] fetching banner
[00:40:34] [INFO] retrieved: Microsoft SQL Server 2008 (SP1) - 10.0.2531.0
(X64)
Mar 29 2009 10:11:52
Copyright (c) 1988-2008 Microsoft Corporation
Web Edition (64-bit) on Windows NT 6.0 <X64> (Build 6001: Service Pack
1) (VM)
[00:59:32] [INFO] the back-end DBMS operating system is Windows 2003 Service
Pack 1
[00:59:32] [ERROR] unhandled exception in sqlmap/0.8-rc7 - automatic SQL
injection and database takeover tool, please copy the command line and the
following text and send by e-mail to sql...@li.... The
developer will fix it as soon as possible:
sqlmap version: 0.8-rc7
Python version: 2.6.4
Operating system: linux2
Traceback (most recent call last):
File "./sqlmap.py", line 77, in main
start()
File "/opt/sqlmap/lib/controller/controller.py", line 257, in start
action()
File "/opt/sqlmap/lib/controller/action.py", line 68, in action
print "%s\n" % conf.dbmsHandler.getFingerprint()
File "/opt/sqlmap/plugins/dbms/mssqlserver.py", line 152, in
getFingerprint
release = kb.bannerFp["dbmsRelease"]
KeyError: 'dbmsRelease'
[*] shutting down at: 00:59:32
Daniel Hückmann - Sophsec Intrusion Labs - Silicon Forest (PDX)
--------------------------------------------------------------------------
http://www.google.com/profiles/sanitybit
http://twitter.com/sanitybit
|