Nope, shouldn't have anything to do with it. How do you know it is exploitable? 
You also haven't tried upping the level with --level=5 which is different from 
risk

Sent from a computer

> On Oct 25, 2014, at 1:41 AM, a dehqan <dehqa...@gmail.com> wrote:
> 
> Hi 
> 
> 
> Thanks;
> 
> Yes of course it's exploitable .
> 
> As you see i have used --risk=3 before.
> 
> I think Sqlmap isn't able to handle it properly because there is custom 
> injection in name of parameter and also name is an array .
> Any Opinion ?
> 
> 
> Regards dehqan 
> 
>> On Fri, Oct 24, 2014 at 4:00 AM, Ryan Sears <rdse...@mtu.edu> wrote:
>> // Grrr, stupid gmail. Didn't reply-all first time :-P 
>> 
>> Are you sure it's exploitable? Try upping the --level and --risk.
>> 
>> The #1* means the first * character you put into the --data parameter. It's 
>> in lieu of saying something like "POST parameter 'derp' is not exploitable" 
>> if you pass in --data="derp=testme" and ask it to test the "derp" parameter. 
>> 
>> Ryan
>> 
>>> On Thu, Oct 23, 2014 at 5:14 AM, a dehqan <dehqa...@gmail.com> wrote:
>>> Thanks man ; 
>>> 
>>> I want to send an array with query in its index as value of "name" POST 
>>> variable .
>>> 
>>> Remember if i want inject it manually should try > 
>>> <input type="text" id="edit-name" name="name[1 ;UPDATE {users} SET pass= 
>>> 'test123'; -- ]" value="" size="60" maxlength="60" class="form-text 
>>> required error">
>>> 
>>> So tried (sqlmap/1.0-dev) :
>>> 
>>> python sqlmap.py -u "http://localhost//?id=n&ssid=w"; --data="name[0*]=name" 
>>>  --risk=3 --flush-session --dbms=mysql
>>> 
>>> 
>>> Sqlmap returns this error:
>>> 
>>> [WARNING] (custom) POST parameter '#1*' is not injectable
>>> 
>>> What does # mean here ?
>>> 
>>> And how to make it work under sqlmap ?
>>> 
>>> Regards
>>> 
>>>> On Thu, Oct 23, 2014 at 11:00 AM, Miroslav Stampar 
>>>> <miroslav.stam...@gmail.com> wrote:
>>>> Hi.
>>>> 
>>>> You need to put a custom injection mark * at the place where you want 
>>>> sqlmap to inject. For example:
>>>> 
>>>> ...name[1*]
>>>> 
>>>> Bye
>>>> 
>>>> p.s. your example with SELECT is not a proper one as queries are usually 
>>>> not supported in stacking
>>>> 
>>>>> On Thu, Oct 23, 2014 at 7:43 AM, a dehqan <dehqa...@gmail.com> wrote:
>>>>> Hi Guys ,
>>>>> 
>>>>> Is Sqlmap able to send an array instead of string while injecting? 
>>>>> 
>>>>> Like situation we  have html form and we want manually send post variable 
>>>>> 'name' this way (value is obtained from array) :
>>>>> 
>>>>> name="name[1 ;select * from users -- ]
>>>>> 
>>>>> I want do it with Sqlmap , but how ?
>>>>> 
>>>>> 
>>>>> Regards dehqan
>>>> 
>>>> 
>>>> 
>>>> -- 
>>>> Miroslav Stampar
>>>> http://about.me/stamparm
>>> 
>>> 
>>> ------------------------------------------------------------------------------
>>> 
>>> _______________________________________________
>>> sqlmap-users mailing list
>>> sqlmap-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>> 
>> 
> 
> ------------------------------------------------------------------------------
> _______________________________________________
> sqlmap-users mailing list
> sqlmap-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
------------------------------------------------------------------------------
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to