hi Max.
-t debug.log will save the inbound/outbound HTTP traffic between the
target and sqlmap.
as you are dealing with boolean based injection there for sure won't
be any "readable" data inside as every request represents only one bit
of information you are looking for (current-db)
Kind regards
Hello,
I'm trying to manually reproduce a blind sql injection that sqlmap ( 0.9 )
found.
here is how I ran it.
./sqlmap.py -v 6 --level 5 -u "http://site?id=9"; --current-db -t debug.log
debug.log does not show any sign of a current-db ( that is in output/site/log )
What am I missing?
sqlm