There is a website which has some sort of (bad) web application firewall
that calls sleep() with a high value every time it detects an attack.
When running sqlmap agaist this website, it stops the probes after
finding a url that triggers this behavior.
Is there any way to tell sqlmap to treat a timeout as 'not vulnerable to
this technique'?
|