Hello,

I encountered a situation where --batch ended up prematurely ending a scan of a 
website.  The reason is because there was an invalid link on the site's HTML 
document, that confused sqlmap into exiting.  Here's the output which I think 
should explain it better:

root@apj351:~# ./sqlmap.py --random-agent --threads=5 -u 
'http://XXXXXXXXXXXXXXXXXX/' --crawl=5 --batch

    sqlmap/1.0-dev (r5058) - automatic SQL injection and database takeover tool
    http://www.sqlmap.org

[!] legal disclaimer: usage of sqlmap for attacking targets without prior 
mutual consent is illegal. It is the end user's responsibility to obey all 
applicable local, state and federal laws. Authors assume no liability and are 
not responsible for any misuse or damage caused by this program

[*] starting at 08:06:59

[08:06:59] [INFO] fetched random HTTP User-Agent header from file 
'/opt/sqlmap/txt/user-agents.txt': Opera/9.80 (X11; Linux x86_64; U; en-GB) 
Presto/2.2.15 Version/10.01
[08:06:59] [INFO] starting crawler
[08:06:59] [INFO] searching for links with depth 1
[08:07:00] [INFO] heuristics detected web page charset 'ascii'
[08:07:00] [INFO] searching for links with depth 2
[08:07:00] [INFO] starting 5 threads
[08:07:02] [INFO] 3/57 links visited (5%)
[08:07:02] [INFO] heuristics detected web page charset 'utf-8'
[08:07:12] [INFO] 28/57 links visited (49%)
[08:07:12] [INFO] heuristics detected web page charset 'ISO-8859-2'
[08:07:22] [INFO] searching for links with depth 3
[08:07:22] [INFO] starting 5 threads
[08:07:47] [INFO] searching for links with depth 4
[08:07:47] [INFO] starting 5 threads
[08:08:14] [INFO] searching for links with depth 5
[08:08:14] [INFO] starting 5 threads
[08:08:41] [INFO] sqlmap got a total of 20 targets
[08:08:41] [INFO] url 1:
GET http:/XXXXXXXXXXXXXXXXXX/YYYYYYYYYYY.aspx?selected=03. Something somsething 
something (Yadda yadda)
do you want to test this url? [Y/n/q]
> Y
[08:08:41] [INFO] testing url 
http:/XXXXXXXXXXXXXXXXXX/YYYYYYYYYYY.aspx?selected=03. Something somsething 
something (Yadda yadda)
[08:08:41] [WARNING] it appears that you have provided tainted parameter values 
('selected=03. Something somsething something (Yadda yadda)') with most 
probably leftover chars from manual sql injection tests (;()') or non-valid 
numerical value. Please, always use only valid parameter values so sqlmap could 
be able to properly run
[08:08:41] [INFO] Are you sure you want to continue? [y/N] N

[*] shutting down at 08:08:41


I think in addition to --batch, it would be useful to have something like --yes 
which just assumes "yes" for any prompt that comes up.  It is just an idea, but 
I thought it might be useful since --batch is most often used in 
non-interactive scripts where the user might not catch what happened.


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to