It is a false positive because of filters sanitize, or some function decode ()
making sure the ID explicitly safe? Or some other reason?
Date: Wed, 12 Jun 2013 06:02:23 +0200
Subject: Re: [sqlmap-users] error or bug
From: miroslav.stam...@gmail.com
To: jonatah-rom...@hotmail.com
CC: sqlmap-users@lists.sourceforge.net
Hi.
It's a false positive.
Kind regards,
Miroslav Stampar
On Jun 12, 2013 2:42 AM, "Jonatah Romero" <jonatah-rom...@hotmail.com> wrote:
Hello guys, i made 3 attempts injection, all 3 have unequal information, one
said there was no injection, the other said through heuristics to be Firebird
DBMS, and the DBMS be another SAP MaxDB. I also tested it with --tamper, and
--string, as stated sqlmap, stated that it was a false positive. It would be a
bug or error?
Love information, more and more, I'm hungry :-).
sqlmap.py -u "https://website/action/link?id=value" --fingerprint --threads=10
--technique=B
sqlmap/1.0-dev-42a8234 - automatic SQL injection and database takeover tool
http://sqlmap.org
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior
mutual consent is illegal. It is the end user'
s responsibility to obey all applicable local, state and federal laws.
Developers assume no liability and are not responsible for any misuse or damage
caused by this program
[*] starting at 20:42:06
[20:42:06] [INFO] testing connection to the target URL[20:42:06] [INFO]
heuristics detected web page charset 'ascii'[20:42:06] [INFO] testing if the
target URL is stable. This can take a coulpe of seconds
[20:42:08] [INFO] testing if GET parameter 'id' is dynamic[20:42:08] [WARNING]
GET parameter 'id' does not appear dynamic[20:42:09] [WARNING] heuristic
<basic> test shows that GET parameter 'id' might not be injectable
[20:42:09] [INFO] testing for SQL injection on GET parameter 'id'[20:42:09]
[INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'[20:42:14]
[INFO] GET parameter 'id' seems to be 'AND boolean-based blind - WHERE or
HAVING clause' injectable <with --string="0.0001">
[20:42:18] [INFO] heuristic <extended> test shows that the back-end DBMS could
be 'Firebird'do you want to include all tests for 'Firebird' extending provided
level <1> and risk <1>? [Y/n] y
[20:42:26] [INFO] checking if the injection point on GET parameter 'id' is a
false positive[20:42:27] [WARNING] false positive or unexploitable injection
point detected[20:42:27] [WARNING] there is a possibility that the character
'>' is filtered by the back-end server. You can try to rerun with
'--tamper=between'
[20:42:27] [WARNING] GET parameter 'id' is not injectable[20:42:27] [CRITICAL]
all teste parameters appear to be not injectable. Try to increase
'--level'/'--risk' values to perform more tests. Rerun without providing the
option '--technique'. Also, you can try to rerun by providing a valid value for
option '--string' as perhaps the string you have choosen does not match
exclusively True responses
[*] shutting down at 20:42:27
------------------------------------------------------------------------------
This SF.net email is sponsored by Windows:
Build for Windows Store.
http://p.sf.net/sfu/windows-dev2dev
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users
------------------------------------------------------------------------------
This SF.net email is sponsored by Windows:
Build for Windows Store.
http://p.sf.net/sfu/windows-dev2dev
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users