Please wait a bit. There are tons of bugs for HSQLDB in sqlmap. On it right now.
Bye On Fri, Oct 9, 2015 at 2:20 PM, Miroslav Stampar <miroslav.stam...@gmail.com > wrote: > Hi again. > > Please update to the latest revision and retry it again (with > --flush-session). > > Backend used is HSQLDB while the sqlmap wrongly recognized it as MySQL > (because HSQLDB is MySQL look-alike) > > Bye > > On Fri, Oct 9, 2015 at 12:49 PM, Vojtěch Polášek <krec...@gmail.com> > wrote: > >> Hi, >> You can download Webgoat here: >> >> https://webgoat.atlassian.net/builds/browse/WEB-WGM/latestSuccessful/artifact/shared/WebGoat-Embedded-Tomcat/WebGoat-6.0.1-war-exec.jar >> Just run java- jar WebGoat-6.0.1-war-exec.jar >> And you can login at localhost:8080/WebGoat with name webgoat and >> password webgoat >> The request file posted earlier is from Blind numeric SQL injection >> lesson. >> Application is written in Java and runs on embedded Tomcat 7 server. >> I am using this command, where "request" is request file posted earlier >> and valid_cookie is simply valid cookie. >> python2 /opt/sqlmap/sqlmap.py -r request --level=5 --risk=3 -o >> --cookie="JSESSIONID=valid_cookie' -v3 >> As I stated earlier, sqlmap finds the vulnerability but can't exploit it, >> I tried almost all tamper scripts, even some combinations, but no success. >> I wanted to show exploitation of Webgoat, because I would like to use >> Sqlmap for testing of commercial application which is based on similar >> technologies. >> Thank you, >> Vojta >> >> >> Dne 9.10.2015 v 11:16 Miroslav Stampar napsal(a): >> >> Hi. >> >> Can you please send a used sqlmap command along with the basic info on >> vulnerable environment (e.g. just a plain Webgoat, URL this and that)? >> >> Bye >> >> On Thu, Oct 8, 2015 at 10:52 PM, Vojtěch Polášek <krec...@gmail.com> >> wrote: >> >>> Greetings, >>> I am running Webgoat from standalone jar file, so I can't see any logs. >>> I will try to see some logs from inside the application. Anyway, I >>> didn't expect this application to contain any kind of filtering. >>> I hope to show Sqlmap in action to some people from a large company and >>> I wanted to use something simple, therefore I am quite surprised. I have >>> never seen this situation - found injection but no possibility of >>> exploitation. >>> The between tamper script didn't help. >>> Any suggestions are welcomed. >>> Thanks, >>> Vojta >>> >>> Dne 8.10.2015 v 18:10 Brandon Perry napsal(a): >>> > You should look in the logs of the web server and see what they say. >>> > >>> > I bet you need --tamper=between >>> > >>> > Sent from a phone >>> > >>> >> On Oct 8, 2015, at 10:33 AM, Vojtěch Polášek <krec...@gmail.com> >>> wrote: >>> >> >>> >> Greetings, >>> >> I tried to verify Sqlmap's functionality by running it against Webgoat >>> >> version 6.0.1. You can try it your self by using following request >>> file. >>> >> Just log in and replace cookie by valid one. >>> >> ###start request file >>> >> POST /WebGoat/attack?Screen=4&menu=1100 HTTP/1.1 >>> >> Host: localhost:8080 >>> >> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:41.0) Gecko/20100101 >>> >> Firefox/41.0 >>> >> Accept: */* >>> >> Accept-Language: cs,en-US;q=0.7,en;q=0.3 >>> >> Accept-Encoding: gzip, deflate >>> >> Content-Type: application/x-www-form-urlencoded; charset=UTF-8 >>> >> X-Requested-With: XMLHttpRequest >>> >> Referer: http://localhost:8080/WebGoat/start.mvc >>> >> Content-Length: 29 >>> >> Cookie: JSESSIONID=replace >>> >> Connection: keep-alive >>> >> Pragma: no-cache >>> >> Cache-Control: no-cache >>> >> >>> >> account_number=101&SUBMIT=Go! >>> >> #end request file >>> >> I am running git master of Sqlmap. >>> >> Sqlmap detects SQL injection (boolean based blind Mysql), but no >>> >> information gathering commands work (--dbs, --current-user...). I >>> tried >>> >> running with --hex or --no-cast, but no luck. >>> >> What might be the problem? >>> >> Thanks, >>> >> Vojta >>> >> >>> >> >>> ------------------------------------------------------------------------------ >>> >> _______________________________________________ >>> >> sqlmap-users mailing list >>> >> sqlmap-users@lists.sourceforge.net >>> >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>> >>> >>> >>> ------------------------------------------------------------------------------ >>> _______________________________________________ >>> sqlmap-users mailing list >>> sqlmap-users@lists.sourceforge.net >>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>> >> >> >> >> -- >> Miroslav Stampar >> http://about.me/stamparm >> >> >> >> >> ------------------------------------------------------------------------------ >> >> _______________________________________________ >> sqlmap-users mailing list >> sqlmap-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> >> > > > -- > Miroslav Stampar > http://about.me/stamparm > -- Miroslav Stampar http://about.me/stamparm
------------------------------------------------------------------------------
_______________________________________________ sqlmap-users mailing list sqlmap-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/sqlmap-users