Hi,

 I think i already tried that but I'll give it another go and report
back

-j
On Sun, 8 May 2011 23:35:18 +0300, Ahmed Shawky <ah...@isecur1ty.org>
wrote:
> try --level 3 --risk 3
> 
> On Sun, May 8, 2011 at 11:33 PM,  wrote:
>  Hi,
> 
>   I was recently messing around with another scanner and I found an
>  injection I'd like to play around with in Sqlmap.
> 
>   The injection found is a POST to something.asp and its "
>  action=login&login=whatever'=sleep(15)='&password= ". I verified it
>  manually and its good to go, however I've not yet been able to get
>  SQLmap to detect and exploit it.
> 
>   I've been messing with --prefix and --suffix but I cant get any
> joy.
> 
>   Any ideas on this boys?
> 
>  Thanks in advance,
>  James
> 
>
> ------------------------------------------------------------------------------
>  WhatsUp Gold - Download Free Network Management Software
>  The most intuitive, comprehensive, and cost-effective network
>  management toolset available today.  Delivers lowest initial
>  acquisition cost and overall TCO of any competing solution.
>  http://p.sf.net/sfu/whatsupgold-sd [2]
>  _______________________________________________
>  sqlmap-users mailing list
>  sqlmap-users@lists.sourceforge.net [3]
>  https://lists.sourceforge.net/lists/listinfo/sqlmap-users [4]


------------------------------------------------------------------------------
WhatsUp Gold - Download Free Network Management Software
The most intuitive, comprehensive, and cost-effective network 
management toolset available today.  Delivers lowest initial 
acquisition cost and overall TCO of any competing solution.
http://p.sf.net/sfu/whatsupgold-sd
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to