Re: [sqlmap-users] manually verifying the vuln that sqlmap found

2011-09-05 Thread Miroslav Stampar
hi Max. -t debug.log will save the inbound/outbound HTTP traffic between the target and sqlmap. as you are dealing with boolean based injection there for sure won't be any "readable" data inside as every request represents only one bit of information you are looking for (current-db) Kind regards

[sqlmap-users] manually verifying the vuln that sqlmap found

2011-09-05 Thread Max Pain
Hello,  I'm trying to manually reproduce a blind sql injection that sqlmap ( 0.9 ) found. here is how I ran it.  ./sqlmap.py -v 6 --level 5  -u "http://site?id=9"; --current-db -t debug.log debug.log does not show any sign of a current-db ( that is in output/site/log )  What am I missing? sqlm