request.txt is a http request from burp. I've added a star in the request
body because that is where the injection is.
when using "sqlmap.py -r request.txt"
No payload is injected into the request.
Also when using the -v 6 option it is not showing the [PAYLOAD] line e.g.:
[16:18:36] [PAYLOAD] ) AND 4129=1138 AND (5586=5586
------------------------------------------------------------------------------
LIMITED TIME SALE - Full Year of Microsoft Training For Just $49.99!
1,500+ hours of tutorials including VisualStudio 2012, Windows 8, SharePoint
2013, SQL 2012, MVC 4, more. BEST VALUE: New Multi-Library Power Pack includes
Mobile, Cloud, Java, and UX Design. Lowest price ever! Ends 9/20/13.
http://pubads.g.doubleclick.net/gampad/clk?id=58041151&iu=/4140/ostg.clktrk
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users