Fixed tons of bugs and pushed. Please retry it again.

Bye

On Fri, Oct 9, 2015 at 3:55 PM, Miroslav Stampar <miroslav.stam...@gmail.com
> wrote:

> Please wait a bit. There are tons of bugs for HSQLDB in sqlmap. On it
> right now.
>
> Bye
>
> On Fri, Oct 9, 2015 at 2:20 PM, Miroslav Stampar <
> miroslav.stam...@gmail.com> wrote:
>
>> Hi again.
>>
>> Please update to the latest revision and retry it again (with
>> --flush-session).
>>
>> Backend used is HSQLDB while the sqlmap wrongly recognized it as MySQL
>> (because HSQLDB is MySQL look-alike)
>>
>> Bye
>>
>> On Fri, Oct 9, 2015 at 12:49 PM, Vojtěch Polášek <krec...@gmail.com>
>> wrote:
>>
>>> Hi,
>>> You can download Webgoat here:
>>>
>>> https://webgoat.atlassian.net/builds/browse/WEB-WGM/latestSuccessful/artifact/shared/WebGoat-Embedded-Tomcat/WebGoat-6.0.1-war-exec.jar
>>> Just run java- jar WebGoat-6.0.1-war-exec.jar
>>> And you can login at localhost:8080/WebGoat with name webgoat and
>>> password webgoat
>>> The request file posted earlier is from Blind numeric SQL injection
>>> lesson.
>>> Application is written in Java and runs on embedded Tomcat 7 server.
>>> I am using this command, where "request" is request file posted earlier
>>> and valid_cookie is simply valid cookie.
>>> python2 /opt/sqlmap/sqlmap.py -r request --level=5 --risk=3 -o
>>> --cookie="JSESSIONID=valid_cookie' -v3
>>> As I stated earlier, sqlmap finds the vulnerability but can't exploit
>>> it, I tried almost all tamper scripts, even some combinations, but no
>>> success.
>>> I wanted to show exploitation of Webgoat, because I would like to use
>>> Sqlmap for testing of commercial application which is based on similar
>>> technologies.
>>> Thank you,
>>> Vojta
>>>
>>>
>>> Dne 9.10.2015 v 11:16 Miroslav Stampar napsal(a):
>>>
>>> Hi.
>>>
>>> Can you please send a used sqlmap command along with the basic info on
>>> vulnerable environment (e.g. just a plain Webgoat, URL this and that)?
>>>
>>> Bye
>>>
>>> On Thu, Oct 8, 2015 at 10:52 PM, Vojtěch Polášek <krec...@gmail.com>
>>> wrote:
>>>
>>>> Greetings,
>>>> I am running Webgoat from standalone jar file, so I can't see any logs.
>>>> I will try to see some logs from inside the application. Anyway, I
>>>> didn't expect this application to contain any kind of filtering.
>>>> I hope to show Sqlmap in action to some people from a large company and
>>>> I wanted to use something simple, therefore I am quite surprised. I have
>>>> never seen this situation - found injection but no possibility of
>>>> exploitation.
>>>> The between tamper script didn't help.
>>>> Any suggestions are welcomed.
>>>> Thanks,
>>>> Vojta
>>>>
>>>> Dne 8.10.2015 v 18:10 Brandon Perry napsal(a):
>>>> > You should look in the logs of the web server and see what they say.
>>>> >
>>>> > I bet you need --tamper=between
>>>> >
>>>> > Sent from a phone
>>>> >
>>>> >> On Oct 8, 2015, at 10:33 AM, Vojtěch Polášek <krec...@gmail.com>
>>>> wrote:
>>>> >>
>>>> >> Greetings,
>>>> >> I tried to verify Sqlmap's functionality by running it against
>>>> Webgoat
>>>> >> version 6.0.1. You can try it your self by using following request
>>>> file.
>>>> >> Just log in and replace cookie by valid one.
>>>> >> ###start request file
>>>> >> POST /WebGoat/attack?Screen=4&menu=1100 HTTP/1.1
>>>> >> Host: localhost:8080
>>>> >> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:41.0) Gecko/20100101
>>>> >> Firefox/41.0
>>>> >> Accept: */*
>>>> >> Accept-Language: cs,en-US;q=0.7,en;q=0.3
>>>> >> Accept-Encoding: gzip, deflate
>>>> >> Content-Type: application/x-www-form-urlencoded; charset=UTF-8
>>>> >> X-Requested-With: XMLHttpRequest
>>>> >> Referer: http://localhost:8080/WebGoat/start.mvc
>>>> >> Content-Length: 29
>>>> >> Cookie: JSESSIONID=replace
>>>> >> Connection: keep-alive
>>>> >> Pragma: no-cache
>>>> >> Cache-Control: no-cache
>>>> >>
>>>> >> account_number=101&SUBMIT=Go!
>>>> >> #end request file
>>>> >> I am running git master of Sqlmap.
>>>> >> Sqlmap detects SQL injection (boolean based blind Mysql), but no
>>>> >> information gathering commands work (--dbs, --current-user...). I
>>>> tried
>>>> >> running with --hex or --no-cast, but no luck.
>>>> >> What might be the problem?
>>>> >> Thanks,
>>>> >> Vojta
>>>> >>
>>>> >>
>>>> ------------------------------------------------------------------------------
>>>> >> _______________________________________________
>>>> >> sqlmap-users mailing list
>>>> >> sqlmap-users@lists.sourceforge.net
>>>> >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>>
>>>>
>>>>
>>>> ------------------------------------------------------------------------------
>>>> _______________________________________________
>>>> sqlmap-users mailing list
>>>> sqlmap-users@lists.sourceforge.net
>>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>>
>>>
>>>
>>>
>>> --
>>> Miroslav Stampar
>>> http://about.me/stamparm
>>>
>>>
>>>
>>>
>>> ------------------------------------------------------------------------------
>>>
>>> _______________________________________________
>>> sqlmap-users mailing list
>>> sqlmap-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>
>>>
>>
>>
>> --
>> Miroslav Stampar
>> http://about.me/stamparm
>>
>
>
>
> --
> Miroslav Stampar
> http://about.me/stamparm
>



-- 
Miroslav Stampar
http://about.me/stamparm
------------------------------------------------------------------------------
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to