p.s. you can always use something like
http://testphp.vulnweb.com/artists.php?artist=1 for a quick test/show off

On Fri, Oct 9, 2015 at 11:16 AM, Miroslav Stampar <
miroslav.stam...@gmail.com> wrote:

> Hi.
>
> Can you please send a used sqlmap command along with the basic info on
> vulnerable environment (e.g. just a plain Webgoat, URL this and that)?
>
> Bye
>
> On Thu, Oct 8, 2015 at 10:52 PM, Vojtěch Polášek <krec...@gmail.com>
> wrote:
>
>> Greetings,
>> I am running Webgoat from standalone jar file, so I can't see any logs.
>> I will try to see some logs from inside the application. Anyway, I
>> didn't expect this application to contain any kind of filtering.
>> I hope to show Sqlmap in action to some people from a large company and
>> I wanted to use something simple, therefore I am quite surprised. I have
>> never seen this situation - found injection but no possibility of
>> exploitation.
>> The between tamper script didn't help.
>> Any suggestions are welcomed.
>> Thanks,
>> Vojta
>>
>> Dne 8.10.2015 v 18:10 Brandon Perry napsal(a):
>> > You should look in the logs of the web server and see what they say.
>> >
>> > I bet you need --tamper=between
>> >
>> > Sent from a phone
>> >
>> >> On Oct 8, 2015, at 10:33 AM, Vojtěch Polášek <krec...@gmail.com>
>> wrote:
>> >>
>> >> Greetings,
>> >> I tried to verify Sqlmap's functionality by running it against Webgoat
>> >> version 6.0.1. You can try it your self by using following request
>> file.
>> >> Just log in and replace cookie by valid one.
>> >> ###start request file
>> >> POST /WebGoat/attack?Screen=4&menu=1100 HTTP/1.1
>> >> Host: localhost:8080
>> >> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:41.0) Gecko/20100101
>> >> Firefox/41.0
>> >> Accept: */*
>> >> Accept-Language: cs,en-US;q=0.7,en;q=0.3
>> >> Accept-Encoding: gzip, deflate
>> >> Content-Type: application/x-www-form-urlencoded; charset=UTF-8
>> >> X-Requested-With: XMLHttpRequest
>> >> Referer: http://localhost:8080/WebGoat/start.mvc
>> >> Content-Length: 29
>> >> Cookie: JSESSIONID=replace
>> >> Connection: keep-alive
>> >> Pragma: no-cache
>> >> Cache-Control: no-cache
>> >>
>> >> account_number=101&SUBMIT=Go!
>> >> #end request file
>> >> I am running git master of Sqlmap.
>> >> Sqlmap detects SQL injection (boolean based blind Mysql), but no
>> >> information gathering commands work (--dbs, --current-user...). I tried
>> >> running with --hex or --no-cast, but no luck.
>> >> What might be the problem?
>> >> Thanks,
>> >> Vojta
>> >>
>> >>
>> ------------------------------------------------------------------------------
>> >> _______________________________________________
>> >> sqlmap-users mailing list
>> >> sqlmap-users@lists.sourceforge.net
>> >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>
>>
>>
>> ------------------------------------------------------------------------------
>> _______________________________________________
>> sqlmap-users mailing list
>> sqlmap-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>
>
>
>
> --
> Miroslav Stampar
> http://about.me/stamparm
>



-- 
Miroslav Stampar
http://about.me/stamparm
------------------------------------------------------------------------------
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to