sqlmap-users Mailing List for sqlmap (Page 18)
Brought to you by:
inquisb
You can subscribe to this list here.
2008 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(4) |
Oct
(11) |
Nov
(24) |
Dec
(13) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2009 |
Jan
(23) |
Feb
(17) |
Mar
(13) |
Apr
(48) |
May
(22) |
Jun
(18) |
Jul
(22) |
Aug
(13) |
Sep
(23) |
Oct
(6) |
Nov
(11) |
Dec
(25) |
2010 |
Jan
(21) |
Feb
(33) |
Mar
(61) |
Apr
(47) |
May
(48) |
Jun
(30) |
Jul
(24) |
Aug
(37) |
Sep
(52) |
Oct
(59) |
Nov
(32) |
Dec
(57) |
2011 |
Jan
(166) |
Feb
(93) |
Mar
(65) |
Apr
(117) |
May
(87) |
Jun
(124) |
Jul
(102) |
Aug
(78) |
Sep
(65) |
Oct
(22) |
Nov
(71) |
Dec
(79) |
2012 |
Jan
(93) |
Feb
(55) |
Mar
(45) |
Apr
(49) |
May
(56) |
Jun
(93) |
Jul
(95) |
Aug
(42) |
Sep
(26) |
Oct
(36) |
Nov
(32) |
Dec
(46) |
2013 |
Jan
(36) |
Feb
(78) |
Mar
(38) |
Apr
(57) |
May
(35) |
Jun
(39) |
Jul
(23) |
Aug
(33) |
Sep
(28) |
Oct
(38) |
Nov
(22) |
Dec
(16) |
2014 |
Jan
(33) |
Feb
(23) |
Mar
(41) |
Apr
(29) |
May
(12) |
Jun
(20) |
Jul
(21) |
Aug
(23) |
Sep
(18) |
Oct
(34) |
Nov
(12) |
Dec
(39) |
2015 |
Jan
(2) |
Feb
(51) |
Mar
(10) |
Apr
(28) |
May
(9) |
Jun
(22) |
Jul
(32) |
Aug
(35) |
Sep
(29) |
Oct
(50) |
Nov
(8) |
Dec
(2) |
2016 |
Jan
(8) |
Feb
(2) |
Mar
(3) |
Apr
(14) |
May
|
Jun
|
Jul
|
Aug
(12) |
Sep
|
Oct
|
Nov
(1) |
Dec
(19) |
2017 |
Jan
|
Feb
(18) |
Mar
|
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
(4) |
Sep
|
Oct
|
Nov
(2) |
Dec
|
2018 |
Jan
|
Feb
|
Mar
(1) |
Apr
(1) |
May
(3) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2019 |
Jan
|
Feb
|
Mar
|
Apr
(3) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: a d. <deh...@gm...> - 2014-10-25 06:41:39
|
Hi Thanks; Yes of course it's exploitable . As you see i have used --risk=3 before. I think Sqlmap isn't able to handle it properly because there is custom injection in name of parameter and also name is an array . Any Opinion ? Regards dehqan On Fri, Oct 24, 2014 at 4:00 AM, Ryan Sears <rd...@mt...> wrote: > // Grrr, stupid gmail. Didn't reply-all first time :-P > > Are you sure it's exploitable? Try upping the --level and --risk. > > The #1* means the first * character you put into the --data parameter. > It's in lieu of saying something like "POST parameter 'derp' is not > exploitable" if you pass in --data="derp=testme" and ask it to test the > "derp" parameter. > > Ryan > > On Thu, Oct 23, 2014 at 5:14 AM, a dehqan <deh...@gm...> wrote: > >> Thanks man ; >> >> I want to send an array with query in its index as value of "name" POST >> variable . >> >> Remember if i want inject it manually should try > >> <input type="text" id="edit-name" name="name[1 ;UPDATE {users} SET pass= >> 'test123'; -- ]" value="" size="60" maxlength="60" class="form-text >> required error"> >> >> So tried (sqlmap/1.0-dev) : >> >> python sqlmap.py -u "http://localhost//?id=n&ssid=w" >> --data="name[0*]=name" --risk=3 --flush-session --dbms=mysql >> >> >> Sqlmap returns this error: >> >> [WARNING] (custom) POST parameter '#1*' is not injectable >> >> What does # mean here ? >> >> And how to make it work under sqlmap ? >> >> Regards >> >> On Thu, Oct 23, 2014 at 11:00 AM, Miroslav Stampar < >> mir...@gm...> wrote: >> >>> Hi. >>> >>> You need to put a custom injection mark * at the place where you want >>> sqlmap to inject. For example: >>> >>> ...name[1*] >>> >>> Bye >>> >>> p.s. your example with SELECT is not a proper one as queries are usually >>> not supported in stacking >>> >>> On Thu, Oct 23, 2014 at 7:43 AM, a dehqan <deh...@gm...> wrote: >>> >>>> Hi Guys , >>>> >>>> Is Sqlmap able to send an array instead of string while injecting? >>>> >>>> Like situation we have html form and we want manually send post >>>> variable 'name' this way (value is obtained from array) : >>>> >>>> name="name[1 ;select * from users -- ] >>>> >>>> I want do it with Sqlmap , but how ? >>>> >>>> >>>> Regards dehqan >>>> >>> >>> >>> >>> -- >>> Miroslav Stampar >>> http://about.me/stamparm >>> >> >> >> >> ------------------------------------------------------------------------------ >> >> _______________________________________________ >> sqlmap-users mailing list >> sql...@li... >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> >> > |
From: Ryan S. <rd...@mt...> - 2014-10-24 00:30:30
|
// Grrr, stupid gmail. Didn't reply-all first time :-P Are you sure it's exploitable? Try upping the --level and --risk. The #1* means the first * character you put into the --data parameter. It's in lieu of saying something like "POST parameter 'derp' is not exploitable" if you pass in --data="derp=testme" and ask it to test the "derp" parameter. Ryan On Thu, Oct 23, 2014 at 5:14 AM, a dehqan <deh...@gm...> wrote: > Thanks man ; > > I want to send an array with query in its index as value of "name" POST > variable . > > Remember if i want inject it manually should try > > <input type="text" id="edit-name" name="name[1 ;UPDATE {users} SET pass= > 'test123'; -- ]" value="" size="60" maxlength="60" class="form-text > required error"> > > So tried (sqlmap/1.0-dev) : > > python sqlmap.py -u "http://localhost//?id=n&ssid=w" > --data="name[0*]=name" --risk=3 --flush-session --dbms=mysql > > > Sqlmap returns this error: > > [WARNING] (custom) POST parameter '#1*' is not injectable > > What does # mean here ? > > And how to make it work under sqlmap ? > > Regards > > On Thu, Oct 23, 2014 at 11:00 AM, Miroslav Stampar < > mir...@gm...> wrote: > >> Hi. >> >> You need to put a custom injection mark * at the place where you want >> sqlmap to inject. For example: >> >> ...name[1*] >> >> Bye >> >> p.s. your example with SELECT is not a proper one as queries are usually >> not supported in stacking >> >> On Thu, Oct 23, 2014 at 7:43 AM, a dehqan <deh...@gm...> wrote: >> >>> Hi Guys , >>> >>> Is Sqlmap able to send an array instead of string while injecting? >>> >>> Like situation we have html form and we want manually send post >>> variable 'name' this way (value is obtained from array) : >>> >>> name="name[1 ;select * from users -- ] >>> >>> I want do it with Sqlmap , but how ? >>> >>> >>> Regards dehqan >>> >> >> >> >> -- >> Miroslav Stampar >> http://about.me/stamparm >> > > > > ------------------------------------------------------------------------------ > > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > |
From: a d. <deh...@gm...> - 2014-10-23 12:15:06
|
Thanks man ; I want to send an array with query in its index as value of "name" POST variable . Remember if i want inject it manually should try > <input type="text" id="edit-name" name="name[1 ;UPDATE {users} SET pass= 'test123'; -- ]" value="" size="60" maxlength="60" class="form-text required error"> So tried (sqlmap/1.0-dev) : python sqlmap.py -u "http://localhost//?id=n&ssid=w" --data="name[0*]=name" --risk=3 --flush-session --dbms=mysql Sqlmap returns this error: [WARNING] (custom) POST parameter '#1*' is not injectable What does # mean here ? And how to make it work under sqlmap ? Regards On Thu, Oct 23, 2014 at 11:00 AM, Miroslav Stampar < mir...@gm...> wrote: > Hi. > > You need to put a custom injection mark * at the place where you want > sqlmap to inject. For example: > > ...name[1*] > > Bye > > p.s. your example with SELECT is not a proper one as queries are usually > not supported in stacking > > On Thu, Oct 23, 2014 at 7:43 AM, a dehqan <deh...@gm...> wrote: > >> Hi Guys , >> >> Is Sqlmap able to send an array instead of string while injecting? >> >> Like situation we have html form and we want manually send post variable >> 'name' this way (value is obtained from array) : >> >> name="name[1 ;select * from users -- ] >> >> I want do it with Sqlmap , but how ? >> >> >> Regards dehqan >> > > > > -- > Miroslav Stampar > http://about.me/stamparm > |
From: Miroslav S. <mir...@gm...> - 2014-10-23 07:30:44
|
Hi. You need to put a custom injection mark * at the place where you want sqlmap to inject. For example: ...name[1*] Bye p.s. your example with SELECT is not a proper one as queries are usually not supported in stacking On Thu, Oct 23, 2014 at 7:43 AM, a dehqan <deh...@gm...> wrote: > Hi Guys , > > Is Sqlmap able to send an array instead of string while injecting? > > Like situation we have html form and we want manually send post variable > 'name' this way (value is obtained from array) : > > name="name[1 ;select * from users -- ] > > I want do it with Sqlmap , but how ? > > > Regards dehqan > -- Miroslav Stampar http://about.me/stamparm |
From: a d. <deh...@gm...> - 2014-10-23 05:43:18
|
Hi Guys , Is Sqlmap able to send an array instead of string while injecting? Like situation we have html form and we want manually send post variable 'name' this way (value is obtained from array) : name="name[1 ;select * from users -- ] I want do it with Sqlmap , but how ? Regards dehqan |
From: Miroslav S. <mir...@gm...> - 2014-10-22 21:21:25
|
Hi. Thank you for your report and find it fixed now. Kind regards, Miroslav Stampar On Wed, Oct 22, 2014 at 9:53 PM, Seb <aff...@gm...> wrote: > [19:49:15] [CRITICAL] unhandled exception occurred in > sqlmap/1.0-dev-nongit-20141022. It is recommended to retry your run with > the latest development version from official GitHub repository at > 'https://github.com/sqlmapproject/sqlmap'. If the exception persists, > please open a new issue at > 'https://github.com/sqlmapproject/sqlmap/issues/new' (or less preferably > send by e-mail to 'sql...@li...') with the > following text and any other information required to reproduce the bug. > The developers will try to reproduce the bug, fix it accordingly and get > back to you > sqlmap version: 1.0-dev > Python version: 2.6.5 > Operating system: posix > Command line: sqlmap.py -u > ***************************************************** > Technique: None > Back-end DBMS: None (identified) > Traceback (most recent call last): > File "sqlmap.py", line 97, in main > start() > File "/home/sqlmap-master/lib/controller/controller.py", line 369, in > start > if not checkConnection(suppressOutput=conf.forms) or not > checkString() or not checkRegexp(): > File "/home/sqlmap-master/lib/controller/checks.py", line 1269, in > checkConnection > page, _ = Request.queryPage(content=True, noteResponseTime=False) > File "/home/sqlmap-master/lib/request/connect.py", line 900, in > queryPage > page, headers, code = Connect.getPage(url=uri, get=get, post=post, > cookie=cookie, ua=ua, referer=referer, host=host, silent=silent, > method=method, auxHeaders=auxHeaders, response=response, > raise404=raise404, ignoreTimeout=timeBasedCompare) > File "/home/sqlmap-master/lib/request/connect.py", line 319, in getPage > headers = forgeHeaders({HTTP_HEADER.COOKIE: cookie, > HTTP_HEADER.USER_AGENT: ua, HTTP_HEADER.REFERER: referer}) > File "/home/sqlmap-master/lib/request/basic.py", line 56, in > forgeHeaders > headers.update(items or {}) > File "/home/sqlmap-master/thirdparty/odict/odict.py", line 691, in > update > raise TypeError('undefined order, cannot get items from dict') > TypeError: undefined order, cannot get items from dict > > > > ------------------------------------------------------------------------------ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > -- Miroslav Stampar http://about.me/stamparm |
From: Seb <aff...@gm...> - 2014-10-22 19:52:54
|
[19:49:15] [CRITICAL] unhandled exception occurred in sqlmap/1.0-dev-nongit-20141022. It is recommended to retry your run with the latest development version from official GitHub repository at 'https://github.com/sqlmapproject/sqlmap'. If the exception persists, please open a new issue at 'https://github.com/sqlmapproject/sqlmap/issues/new' (or less preferably send by e-mail to 'sql...@li...') with the following text and any other information required to reproduce the bug. The developers will try to reproduce the bug, fix it accordingly and get back to you sqlmap version: 1.0-dev Python version: 2.6.5 Operating system: posix Command line: sqlmap.py -u ***************************************************** Technique: None Back-end DBMS: None (identified) Traceback (most recent call last): File "sqlmap.py", line 97, in main start() File "/home/sqlmap-master/lib/controller/controller.py", line 369, in start if not checkConnection(suppressOutput=conf.forms) or not checkString() or not checkRegexp(): File "/home/sqlmap-master/lib/controller/checks.py", line 1269, in checkConnection page, _ = Request.queryPage(content=True, noteResponseTime=False) File "/home/sqlmap-master/lib/request/connect.py", line 900, in queryPage page, headers, code = Connect.getPage(url=uri, get=get, post=post, cookie=cookie, ua=ua, referer=referer, host=host, silent=silent, method=method, auxHeaders=auxHeaders, response=response, raise404=raise404, ignoreTimeout=timeBasedCompare) File "/home/sqlmap-master/lib/request/connect.py", line 319, in getPage headers = forgeHeaders({HTTP_HEADER.COOKIE: cookie, HTTP_HEADER.USER_AGENT: ua, HTTP_HEADER.REFERER: referer}) File "/home/sqlmap-master/lib/request/basic.py", line 56, in forgeHeaders headers.update(items or {}) File "/home/sqlmap-master/thirdparty/odict/odict.py", line 691, in update raise TypeError('undefined order, cannot get items from dict') TypeError: undefined order, cannot get items from dict |
From: R W <rw8...@gm...> - 2014-10-18 22:30:59
|
Hi all, Just looking for any tips on exploiting MySQL 3.x with sqlmap. It's a pretty standard injection, but the best I've been able to do is extract the database name with sqlmap. I'm using the B technique, have tried --hex, --no-cast, etc, but none of the functions sqlmap is using exist in MySQL 3.x, e.g. union, cast, convert, so I'm reduced to manual exploitation with scripts and mid(), char(), etc. No big deal, just wondering if there's a quick way to get a bit further with sqlmap before I go back to manual exploitation through Burp. Thanks |
From: Dennis <kor...@ya...> - 2014-10-17 13:35:44
|
Hi everybody, if I pass a PUT request via "-r" to sqlmap, it will send requests to the server using POST. 1. Is this intended? 2. If yes, is there a way to switch it off? Thanks in advance! Dennis |
From: Miroslav S. <mir...@gm...> - 2014-10-16 05:04:37
|
You have a reduced version of Python, commonly a result of custom build. Please get the official build to get everything up and running. Bye On Oct 16, 2014 2:27 AM, "FLO" <neu...@ch...> wrote: > Hey, > When i want to start sqlmap, i type in "python sqlmap.py", and when i do > this, i get following error message: > "missing one or more core extensions ('gzip' , 'ssl' , 'sqlite' , > 'zlib') most probably because current version of Python has been built > without appropriate dev packages (e.g. 'libsqlite3-dev')" > Do you know what that mean? > I use freebsd 10.0. > Thx4help.. > > --- > Diese E-Mail ist frei von Viren und Malware, denn der avast! Antivirus > Schutz ist aktiv. > http://www.avast.com > > > > ------------------------------------------------------------------------------ > Comprehensive Server Monitoring with Site24x7. > Monitor 10 servers for $9/Month. > Get alerted through email, SMS, voice calls or mobile push notifications. > Take corrective actions from your mobile device. > http://p.sf.net/sfu/Zoho > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > |
From: FLO <neu...@ch...> - 2014-10-16 00:26:58
|
Hey, When i want to start sqlmap, i type in "python sqlmap.py", and when i do this, i get following error message: "missing one or more core extensions ('gzip' , 'ssl' , 'sqlite' , 'zlib') most probably because current version of Python has been built without appropriate dev packages (e.g. 'libsqlite3-dev')" Do you know what that mean? I use freebsd 10.0. Thx4help.. --- Diese E-Mail ist frei von Viren und Malware, denn der avast! Antivirus Schutz ist aktiv. http://www.avast.com |
From: Miroslav S. <mir...@gm...> - 2014-10-13 19:24:59
|
Both are secure if you know what are you doing. Also, --tor should work out of box if you have a Tor bundle installed (e.g. Vidalia) Bye On Oct 13, 2014 8:35 PM, "FLO" <neu...@ch...> wrote: > Hey, > I am curious about the security level of sqlmap.. is it more secure to > use --tor or --proxy? > And is it enough to write --tor, when my tor generally is configured well? > Or do i have to specifiy in sqlmap an specific socks?! > Thx for an answer, > Flo > > --- > Diese E-Mail ist frei von Viren und Malware, denn der avast! Antivirus > Schutz ist aktiv. > http://www.avast.com > > > > ------------------------------------------------------------------------------ > Comprehensive Server Monitoring with Site24x7. > Monitor 10 servers for $9/Month. > Get alerted through email, SMS, voice calls or mobile push notifications. > Take corrective actions from your mobile device. > http://p.sf.net/sfu/Zoho > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > |
From: FLO <neu...@ch...> - 2014-10-13 18:34:59
|
Hey, I am curious about the security level of sqlmap.. is it more secure to use --tor or --proxy? And is it enough to write --tor, when my tor generally is configured well? Or do i have to specifiy in sqlmap an specific socks?! Thx for an answer, Flo --- Diese E-Mail ist frei von Viren und Malware, denn der avast! Antivirus Schutz ist aktiv. http://www.avast.com |
From: Miroslav S. <mir...@gm...> - 2014-10-13 10:03:42
|
You are most probably running the old version of sqlmap (installed on your system via system repository). Please do this: 1) cd /tmp 2) git clone https://github.com/sqlmapproject/sqlmap.git 3) cd /tmp/sqlmap 4) python sqlmap.py Bye On Sun, Oct 12, 2014 at 9:45 PM, FLO <neu...@ch...> wrote: > Hey Guys, > I use sqlmap 0.9 at freebsd 10.0 system, and i have the problem, that in > my shell: when i run the command "sqlmap" there is no color highlighting! > I only have black letters, and white background. Normally i have colours > in my shell! > So what to do? And also: I dont know why, but i cant start sqlmap with > the common command: "python sqlmap.py", only with the command "sqlmap" > it works. > Would be fine, if you can help me! > Thx, > Flo > > --- > Diese E-Mail ist frei von Viren und Malware, denn der avast! Antivirus > Schutz ist aktiv. > http://www.avast.com > > > > ------------------------------------------------------------------------------ > Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer > Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports > Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper > Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer > http://p.sf.net/sfu/Zoho > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > -- Miroslav Stampar http://about.me/stamparm |
From: André S. <and...@gm...> - 2014-10-13 10:03:08
|
Sync the last sqlmap version. Cheers 2014-10-12 20:45 GMT+01:00 FLO <neu...@ch...>: > Hey Guys, > I use sqlmap 0.9 at freebsd 10.0 system, and i have the problem, that in > my shell: when i run the command "sqlmap" there is no color highlighting! > I only have black letters, and white background. Normally i have colours > in my shell! > So what to do? And also: I dont know why, but i cant start sqlmap with > the common command: "python sqlmap.py", only with the command "sqlmap" > it works. > Would be fine, if you can help me! > Thx, > Flo > > --- > Diese E-Mail ist frei von Viren und Malware, denn der avast! Antivirus Schutz ist aktiv. > http://www.avast.com > > > ------------------------------------------------------------------------------ > Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer > Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports > Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper > Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer > http://p.sf.net/sfu/Zoho > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users |
From: Miroslav S. <mir...@gm...> - 2014-10-13 10:00:59
|
Hi. It should be fixed now. Bye On Mon, Oct 13, 2014 at 11:24 AM, PentestXss <pen...@12...> wrote: > [17:18:14] [CRITICAL] unhandled exception occurred in > sqlmap/1.0-dev-nongit-20141013. It is recommended to retry your run with > the latest development version from official GitHub repository at ' > https://github.com/sqlmapproject/sqlmap'. If the exception persists, > please open a new issue at ' > https://github.com/sqlmapproject/sqlmap/issues/new' (or less preferably > send by e-mail to 'sql...@li...') with the > following text and any other information required to reproduce the bug. The > developers will try to reproduce the bug, fix it accordingly and get back > to you > sqlmap version: 1.0-dev > Python version: 2.6.5 > Operating system: posix > Command line: sqlmap.py > --url=**************************************************** --random-agent > --threads=5 --dbms=mssqlserver --current-user --current-db -v 3 --os-shell > Back-end DBMS: Microsoft SQL Server (fingerprinted) > Traceback (most recent call last): > File "sqlmap.py", line 97, in main > start() > File "/root/sqlmap-dev/lib/controller/controller.py", line 585, in start > action() > File "/root/sqlmap-dev/lib/controller/action.py", line 160, in action > conf.dbmsHandler.osShell() > File "/root/sqlmap-dev/plugins/generic/takeover.py", line 83, in osShell > self.shell() > File "/root/sqlmap-dev/lib/takeover/abstraction.py", line 144, in shell > self.runCmd(command) > File "/root/sqlmap-dev/lib/takeover/abstraction.py", line 86, in runCmd > output = self.evalCmd(cmd) > File "/root/sqlmap-dev/lib/takeover/abstraction.py", line 66, in evalCmd > retVal = self.xpCmdshellEvalCmd(cmd, first, last) > File "/root/sqlmap-dev/lib/takeover/xp_cmdshell.py", line 229, in > xpCmdshellEvalCmd > if not (output[0] or "").strip(): > AttributeError: 'list' object has no attribute 'strip' > > > > > > ------------------------------------------------------------------------------ > Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer > Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports > Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper > Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer > http://p.sf.net/sfu/Zoho > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar http://about.me/stamparm |
From: PentestXss <pen...@12...> - 2014-10-13 09:24:53
|
[17:18:14] [CRITICAL] unhandled exception occurred in sqlmap/1.0-dev-nongit-20141013. It is recommended to retry your run with the latest development version from official GitHub repository at 'https://github.com/sqlmapproject/sqlmap'. If the exception persists, please open a new issue at 'https://github.com/sqlmapproject/sqlmap/issues/new' (or less preferably send by e-mail to 'sql...@li...') with the following text and any other information required to reproduce the bug. The developers will try to reproduce the bug, fix it accordingly and get back to you sqlmap version: 1.0-dev Python version: 2.6.5 Operating system: posix Command line: sqlmap.py --url=**************************************************** --random-agent --threads=5 --dbms=mssqlserver --current-user --current-db -v 3 --os-shell Back-end DBMS: Microsoft SQL Server (fingerprinted) Traceback (most recent call last): File "sqlmap.py", line 97, in main start() File "/root/sqlmap-dev/lib/controller/controller.py", line 585, in start action() File "/root/sqlmap-dev/lib/controller/action.py", line 160, in action conf.dbmsHandler.osShell() File "/root/sqlmap-dev/plugins/generic/takeover.py", line 83, in osShell self.shell() File "/root/sqlmap-dev/lib/takeover/abstraction.py", line 144, in shell self.runCmd(command) File "/root/sqlmap-dev/lib/takeover/abstraction.py", line 86, in runCmd output = self.evalCmd(cmd) File "/root/sqlmap-dev/lib/takeover/abstraction.py", line 66, in evalCmd retVal = self.xpCmdshellEvalCmd(cmd, first, last) File "/root/sqlmap-dev/lib/takeover/xp_cmdshell.py", line 229, in xpCmdshellEvalCmd if not (output[0] or "").strip(): AttributeError: 'list' object has no attribute 'strip' |
From: FLO <neu...@ch...> - 2014-10-12 19:45:27
|
Hey Guys, I use sqlmap 0.9 at freebsd 10.0 system, and i have the problem, that in my shell: when i run the command "sqlmap" there is no color highlighting! I only have black letters, and white background. Normally i have colours in my shell! So what to do? And also: I dont know why, but i cant start sqlmap with the common command: "python sqlmap.py", only with the command "sqlmap" it works. Would be fine, if you can help me! Thx, Flo --- Diese E-Mail ist frei von Viren und Malware, denn der avast! Antivirus Schutz ist aktiv. http://www.avast.com |
From: Miroslav S. <mir...@gm...> - 2014-10-09 12:47:32
|
"no i can get to the the page if i change my firefox browser proxy and add correct test proxy ." <- you need to put that same proxy information into sqlmap by using option --proxy (e.g. --proxy="http://192.168.10.2:8000") Bye On Thu, Oct 9, 2014 at 11:38 AM, zana sadi <zan...@ho...> wrote: > Hi there > > I'm wondering if you can kindly help. > > I wan to test SQLmap on test enviroment . > > so basically we have an application which we would like to test it against > sql injection attacks, > the issue is the application is behind a proxy which is internal. > > no i can get to the the page if i change my firefox browser proxy and add > correct test proxy . > > The issue is we don't want to test on live database. so wondering if you > can possibly help? how to go about it > > > Regards > > Sadi > > > ------------------------------------------------------------------------------ > Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer > Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports > Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper > Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer > > http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar http://about.me/stamparm |
From: Hans W. <wur...@go...> - 2014-10-09 12:45:14
|
Maybe this link will help You in your quest... https://github.com/sqlmapproject/sqlmap/wiki/Usage > Am 30.09.2014 um 14:18 schrieb Edwin Echeverria <hol...@gm...>: > > Why do I get this error in the CMD?<hjg.jpg> > > ------------------------------------------------------------------------------ > Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer > Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports > Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper > Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer > http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users |
From: zana s. <zan...@ho...> - 2014-10-09 09:39:05
|
Hi there I'm wondering if you can kindly help. I wan to test SQLmap on test enviroment . so basically we have an application which we would like to test it against sql injection attacks, the issue is the application is behind a proxy which is internal. no i can get to the the page if i change my firefox browser proxy and add correct test proxy . The issue is we don't want to test on live database. so wondering if you can possibly help? how to go about it Regards Sadi |
From: Robin W. <ro...@di...> - 2014-10-01 12:39:07
|
On 1 October 2014 12:37, Miroslav Stampar <mir...@gm...> wrote: > -u "www.target.com/vuln?string=the" --tamper=space2comment > > bye > > p.s. please don't use any SQLi inside provided parameter values > That fixed it, its been a while since I got SQLi on a job so was not thinking properly. Robin > On Wed, Oct 1, 2014 at 11:17 AM, Robin Wood <ro...@di...nja> wrote: > >> It was pointed out that I should be URL encoding the *s which removes >> that as a problem but it still isn't quite working properly, probably >> because of the spaces. Got limited time on this test so going to leave it >> for now and will build a lab to look at it properly later. >> >> Robin >> >> On 1 October 2014 09:54, Robin Wood <ro...@di...nja> wrote: >> >>> I've got the following vulnerable querystring value: >>> >>> string=the%%22/**/and/**/1=1/**/and/**/%22%%22=%22 >>> >>> Where with 1=1 I get data back, 1=0 is false so no data. >>> >>> I can't use spaces which is why I've have to go for /**/. >>> >>> How do I tell sqlmap where the injection point is and to use /**/ >>> instead of spaces? >>> >>> Robin >>> >> >> >> >> ------------------------------------------------------------------------------ >> Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer >> Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports >> Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper >> Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer >> >> http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk >> _______________________________________________ >> sqlmap-users mailing list >> sql...@li... >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> >> > > > -- > Miroslav Stampar > http://about.me/stamparm > |
From: Miroslav S. <mir...@gm...> - 2014-10-01 11:37:16
|
-u "www.target.com/vuln?string=the" --tamper=space2comment bye p.s. please don't use any SQLi inside provided parameter values On Wed, Oct 1, 2014 at 11:17 AM, Robin Wood <ro...@di...nja> wrote: > It was pointed out that I should be URL encoding the *s which removes that > as a problem but it still isn't quite working properly, probably because of > the spaces. Got limited time on this test so going to leave it for now and > will build a lab to look at it properly later. > > Robin > > On 1 October 2014 09:54, Robin Wood <ro...@di...nja> wrote: > >> I've got the following vulnerable querystring value: >> >> string=the%%22/**/and/**/1=1/**/and/**/%22%%22=%22 >> >> Where with 1=1 I get data back, 1=0 is false so no data. >> >> I can't use spaces which is why I've have to go for /**/. >> >> How do I tell sqlmap where the injection point is and to use /**/ instead >> of spaces? >> >> Robin >> > > > > ------------------------------------------------------------------------------ > Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer > Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports > Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper > Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer > > http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar http://about.me/stamparm |
From: Robin W. <ro...@di...> - 2014-10-01 09:25:18
|
I've got the following vulnerable querystring value: string=the%%22/**/and/**/1=1/**/and/**/%22%%22=%22 Where with 1=1 I get data back, 1=0 is false so no data. I can't use spaces which is why I've have to go for /**/. How do I tell sqlmap where the injection point is and to use /**/ instead of spaces? Robin |
From: Robin W. <ro...@di...> - 2014-10-01 09:17:44
|
It was pointed out that I should be URL encoding the *s which removes that as a problem but it still isn't quite working properly, probably because of the spaces. Got limited time on this test so going to leave it for now and will build a lab to look at it properly later. Robin On 1 October 2014 09:54, Robin Wood <ro...@di...nja> wrote: > I've got the following vulnerable querystring value: > > string=the%%22/**/and/**/1=1/**/and/**/%22%%22=%22 > > Where with 1=1 I get data back, 1=0 is false so no data. > > I can't use spaces which is why I've have to go for /**/. > > How do I tell sqlmap where the injection point is and to use /**/ instead > of spaces? > > Robin > |