I am not sure if sqlmap is capable of this, but I have found inserting the
filtered character in the middle of its hex-encoded counterpart (in your
case %2.E for instance) can bypass similar filters.

This only works if the param is url-decoded after the filter is performed
on the string.


On Sun, Aug 10, 2014 at 3:57 PM, <d...@alcor.se> wrote:

> So I did a little test on my site where I simply filtered out "."
> (period) in incoming GET parameters that were vulnerable to SQLi.
> sqlmap then failed to list databases, tables and columns.
> Since INFORMATION_SCHEMA.TABLES would become INFORMATION_SCHEMATABLES
> and fail with a "Table testdb.INFORMATION_SCHEMATABLES doesn't exist".
> Can sqlmap bypass this somehow? I have played around with tamper a bit,
> but haven't bypassed it yet (haven't tried all tamper scripts though,
> only some that sounded logical to try).
>
> Note: I don't see this as a means to protect my sites in the future.
> It's just a little late Sunday night sqlmap fun :)
>
> Cheers!
>
>
> ------------------------------------------------------------------------------
> _______________________________________________
> sqlmap-users mailing list
> sqlmap-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>



-- 
http://volatile-minds.blogspot.com -- blog
http://www.volatileminds.net -- website
------------------------------------------------------------------------------
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to