Thank you very much, this will certainly help in automating Sqlmap.
But I think it doesn't solve my problem.
I will try to explain it once more and suggest some possible solution,
which came to my mind:
I am trying to find SQL injection flaw in a HTTP request which deletes
an object.
Before every request I need to:
1. send a POSt request to create an object - every object gets a new ID
2. receive response and get new object ID
3. send the deletion request which tests for SQL injection flaw.
As far as I thought about it, the REST API won't help me here.
The --eval argument seems like the best approach for me. From the usage
page I can see, that I can change parameter values in the request
through --eval. That's good. But is it also possible to access
information send in the last response? That's all I need I think. If I
could access information from last response within the --eval, I could
modify original request for deletion to delete the right object.
I guess that there is some name space which can be accessed by my custom
script in the context of --eval, right?
What do you think about it? Do you understand it or should I provide
more information?
And one more question - in which class should I look to get list of all
implemented methods for REST API? I took a brief look at
lib/utils/api.py, but I can't seem to find the right class. I have never
worked with Bottle framework before.
Thanks alot for your help, I really appreciate it.
Best regards,
Vojtěch Polášek

------------------------------------------------------------------------------
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to