[sqlmap-users] POST injection
Brought to you by:
inquisb
From: <ja...@ev...> - 2011-05-08 20:33:14
|
Hi, I was recently messing around with another scanner and I found an injection I'd like to play around with in Sqlmap. The injection found is a POST to something.asp and its " action=login&login=whatever'=sleep(15)='&password= ". I verified it manually and its good to go, however I've not yet been able to get SQLmap to detect and exploit it. I've been messing with --prefix and --suffix but I cant get any joy. Any ideas on this boys? Thanks in advance, James |