hi David.

basically, you are right.

default behavior should be to follow up the redirection.

the real problem is that it wasn't a default thingy in "sqlmap got a
302 redirect to" and we all know that people just like to press Enter
when running sqlmap and we like to make "dummy click-click yeaa" users
:)

will do some changes

kr

On Mon, May 23, 2011 at 9:59 PM, Miroslav Stampar
<miroslav.stam...@gmail.com> wrote:
> hi David.
>
> that suffix thingy should be fixed with the latest commit. please
> retry and report back.
>
> about that 302. well, generally it works, but still, maybe it needs
> little glancing up. it would be great if you could provide with some
> more information (privately).
>
> kr
>
> On Mon, May 23, 2011 at 6:23 PM, Miroslav Stampar
> <miroslav.stam...@gmail.com> wrote:
>> hi David.
>>
>> we'll deal with both issues shortly (today or tomorrow) and keep you posted.
>>
>> kr
>>
>> On Mon, May 23, 2011 at 5:17 PM, David Taylor
>> <daves.not.here....@gmail.com> wrote:
>>> Hi all,
>>> I am new to the list, so can I first say a massive thank you to everybody
>>> that has contributed to the development of this tool; it is awesome.
>>> I have come across a couple of issues with the current version of the tool.
>>> First, trailing whitespace seems to be stripped from the end of --suffix
>>> parameters.  I have a blind injection point that requires " -- " as a
>>> terminator.  If I give the tool --suffix " -- ", this gets turned into
>>> "%20--" in the injection, which doesn't work since the trailing space is
>>> missing.  I've worked around this by appending some extra non-space
>>> characters (--suffix " -- xx"), which works, but shouldn't be necessary.
>>> And second, I don't quite understand how the redirect handling works.  The
>>> same blind injection point I mention above is on a login page.  If I don't
>>> try to inject, or if the injection equates to false, I get a HTTP 200 return
>>> code, with a "login failed" message.  If the injection equates to true, the
>>> application 302's me to another page.
>>> I get the message "sqlmap got a 302 redirect to...", asking me if I want to
>>> re-target.  In this instance, I don't want to choose a new target.  I know
>>> the bsql vuln exists; I just want to use sqlmap to leverage it.  However if
>>> I hit enter to select the default (keep same target), sqlmap doesn't detect
>>> the injection point.
>>> I have also tried providing a --string parameter, but this doesn't affect
>>> the result.
>>> Could we please have some way to blindly follow redirects, and compare the
>>> eventual result page to that retrieved for other injections?
>>> Thanks again,
>>> Dave
>>> ------------------------------------------------------------------------------
>>> What Every C/C++ and Fortran developer Should Know!
>>> Read this article and learn how Intel has extended the reach of its
>>> next-generation tools to help Windows* and Linux* C/C++ and Fortran
>>> developers boost performance applications - including clusters.
>>> http://p.sf.net/sfu/intel-dev2devmay
>>> _______________________________________________
>>> sqlmap-users mailing list
>>> sqlmap-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>
>>>
>>
>>
>>
>> --
>> Miroslav Stampar
>>
>> E-mail: miroslav.stampar (at) gmail.com
>> PGP Key ID: 0xB5397B1B
>>
>
>
>
> --
> Miroslav Stampar
>
> E-mail: miroslav.stampar (at) gmail.com
> PGP Key ID: 0xB5397B1B
>



-- 
Miroslav Stampar

E-mail: miroslav.stampar (at) gmail.com
PGP Key ID: 0xB5397B1B

------------------------------------------------------------------------------
What Every C/C++ and Fortran developer Should Know!
Read this article and learn how Intel has extended the reach of its 
next-generation tools to help Windows* and Linux* C/C++ and Fortran 
developers boost performance applications - including clusters. 
http://p.sf.net/sfu/intel-dev2devmay
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to