Re: [sqlmap-users] AMF sqli injection

2015-05-28 Thread Brandon Perry
That could work. On Thu, May 28, 2015 at 2:24 PM, Chris Oakley wrote: > "Flex is hard because you have to update the integer that tells flex how > long a string is" > > It might be possible to address this with the --eval option > > On 28 May 2015 at 14:59, Brandon Perry wrote: > >> Flex is har

Re: [sqlmap-users] AMF sqli injection

2015-05-28 Thread Chris Oakley
"Flex is hard because you have to update the integer that tells flex how long a string is" It might be possible to address this with the --eval option On 28 May 2015 at 14:59, Brandon Perry wrote: > Flex is hard because you have to update the integer that tells flex how > long a string is, unle

Re: [sqlmap-users] AMF sqli injection

2015-05-28 Thread Brandon Perry
FWIW here is an exploit a wrote a long while back that partly abuses a weak AMF endpoint (xxe, not sqli...). http://packetstormsecurity.com/files/126703/HP-Release-Control-9.20.-Build-395-XXE.html However, I distinctly remember having to keep the admin password the same length as my base AMF

Re: [sqlmap-users] AMF sqli injection

2015-05-28 Thread Brandon Perry
Flex is hard because you have to update the integer that tells flex how long a string is, unless I am mistaken. If not, you could try with the * marker to tell sqlmap exactly where the injection point is. On Thu, May 28, 2015 at 1:21 PM, Christopher Downs < chris.do...@chromeriver.com> wrote: >