Re: [sqlmap-users] SQLMAP Blind injection not supported

2015-02-19 Thread Loïc THOMAS
Oh nevermind, I was using an HTTP request loaded from a file, but using the -u parameter seems to work fine. Thanks anyway. 2015-02-19 22:38 GMT+01:00 Loïc THOMAS : > Hi. > > SQLmap wouldn't detect an injection though manually it works perfectly. > It is on a post request. > > Using this value wi

[sqlmap-users] SQLMAP Blind injection not supported

2015-02-19 Thread Loïc THOMAS
Hi. SQLmap wouldn't detect an injection though manually it works perfectly. It is on a post request. Using this value will display the page : id=75102' and (select user()) ='root@localhost' # Replacing 'root' by anything else won't work (except for the same in uppercase, it seems the charset is

Re: [sqlmap-users] Bug in sqlmap

2015-02-19 Thread Miroslav Stampar
This has been replied earlier. That "bug" was "neutralized". Kind regards On Thu, Jan 29, 2015 at 10:23 AM, sad fastfood wrote: > Hi! > Thanks for the greatest tool! > I've found some problem in latest revision of sqlmap. > If you will run something like: > *sqlmap.py -u "http://www.google.com/

[sqlmap-users] SQLMAP with Time-Based Blind using Heavy Queries ?

2015-02-19 Thread Marc Aurèle Chégnimonhan AYAOVI
Hello. I wonder if SQLMAP support vulnerable sites to "Time-Based Blind SQL Injection using Heavy Queries" ??? For example: // informatica64.com/blind2/pista.aspx?id_pista=1 and (SELECT count(*) FROM sysusers AS sys1, sysusers as sys2, sysusers as sys3, sysusers AS sys4, sysusers AS sy

[sqlmap-users] Bug in sqlmap

2015-02-19 Thread sad fastfood
Hi! Thanks for the greatest tool! I've found some problem in latest revision of sqlmap. If you will run something like: sqlmap.py -u "http://www.google.com/news.php?id=5+OR+(4=4)" --skip-urlencode --random-agent --tamper=space2plus --technique=BSU -v 3 --dbms=mssql And answer 'y' here: [09:1