Please send me privatelly content of traffic file for such run (just append
-t traffic.txt to a problematic run).
Kind regards,
Miroslav Stampar
On Dec 15, 2012 5:10 PM, "Volker Nebelung"
wrote:
> Hi,
>
> I am using sqlmap to scan a specific GET parameter of a target site. I
> know there is a SQ
Propably has something to do with this.
16:38:17] [WARNING] HTTP error codes detected during testing:
400 (Bad Request) - 1 times, 500 (Internal Server Error) - 9 times
Did you try the tamper scripts ?
Am 15.12.2012 um 17:10 schrieb Volker Nebelung <
[email protected]>:
Hi,
I am
Hi,
I am using sqlmap to scan a specific GET parameter of a target site. I know
there is a SQL injection in parameter 2:
python sqlmap.py -u "http://example.net/de/de*/site"; --batch
sqlmap gives me the following result:
> …
> [16:36:19] [INFO] heuristic test shows that URI parameter '#1*' mig