Re: [sqlmap-users] MsSQL - wait command

2014-12-08 Thread hooshmand k
1) "waitfor delay '0:0:0'" makes no delay and ​"waitfor delay '0:0:5'" makes5 seconds delay and so on. 2) I tried again with --tamper=between​ and sqlmap verified the vulnerability. 3) using the tor in timebased techniques is not the best choice but I preferred to be anonymous in pentesting. Best

Re: [sqlmap-users] MsSQL - wait command

2014-12-08 Thread Miroslav Stampar
For sure it is. sqlmap gives you a huge nagging message in such case (network latency...blaballa). Bye On Mon, Dec 8, 2014 at 12:06 PM, Robin Wood wrote: > Wouldn't it be a bad idea trying to do a time based attack over Tor? > > Robin > > On 8 December 2014 at 11:00, Miroslav Stampar > wrote:

Re: [sqlmap-users] MsSQL - wait command

2014-12-08 Thread Robin Wood
Wouldn't it be a bad idea trying to do a time based attack over Tor? Robin On 8 December 2014 at 11:00, Miroslav Stampar wrote: > Hi. > > 1) Shouldn't "waitfor delay '0:0:0'" make no delay? > 2) sqlmap says "false positive or unexploitable injection point detected". > Is there a possibility that

Re: [sqlmap-users] MsSQL - wait command

2014-12-08 Thread Miroslav Stampar
Hi. 1) Shouldn't "waitfor delay '0:0:0'" make no delay? 2) sqlmap says "false positive or unexploitable injection point detected". Is there a possibility that the character > is filtered? 3) Please run sqlmap with -v 3 and use the payloads that sqlmap tries to use in "false positive check" phase.

[sqlmap-users] MsSQL - wait command

2014-12-08 Thread hooshmand k
Hi, There is a website that vulnerable to SQL injection. I have checked and I'm sure there is blind sql injection vulnerability but the sqlmap could not find this. I tried this command: ./sqlmap.py -u 'target' -p search --tor --tor-type=SOCKS5 --random-agent --risk 3 --level 3 --technique=T --dbm