Hello, Here are some debugging information. This is output of Sqlmap running, exploiting and trying to get current db user: http://cloud.vojtapolasek.eu/index.php/s/cCBLy5MGR46pXOe And this is the traffic file: http://cloud.vojtapolasek.eu/index.php/s/jheCneiJfxzrLGV I used: sqlmap -r request --level=5 --risk=3 -o -v3 --cookie="JSESSIONID=valid_cookie" --current-user I deleted whole output directory for localhost before. I hope it helps, Vojta
Dne 10.10.2015 v 01:35 Miroslav Stampar napsal(a): > > I've used that same request file without any problems (with latest > patches/revision). Will retest tomorrow. Please retry everything with > --flush-session > > Bye > > On Oct 10, 2015 1:17 AM, "Vojtěch Polášek" <krec...@gmail.com > <mailto:krec...@gmail.com>> wrote: > > Greetings, > thanks for your prompt response. > Unfortunatelly, it is still not working as expected. > There is problem with retrieving of current user and information > from HSQL database in general. > Moreover, when using following request file from the same > application, Sqlmap identified backend database as Postgresql > instead of HSQL. > This request is from lesson about simple string SQL injection > #begin request file > POST /WebGoat/attack?Screen=36&menu=1100 HTTP/1.1 > Host: localhost:8080 > User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:39.0) > Gecko/20100101 Firefox/39.0 > Accept: */* > Accept-Language: cs,en-US;q=0.7,en;q=0.3 > Accept-Encoding: gzip, deflate > Content-Type: application/x-www-form-urlencoded; charset=UTF-8 > X-Requested-With: XMLHttpRequest > Referer: http://localhost:8080/WebGoat/start.mvc > Content-Length: 29 > Connection: keep-alive > Pragma: no-cache > Cache-Control: no-cache > Cookie: JSESSIONID=valid_cookie > > account_name=Smith&SUBMIT=Go! > #end request > Feel free to ask me for more debugging information, I will be glad > to help you. > Thanks for your work, > Vojta > Dne 9.10.2015 v 16:52 Miroslav Stampar napsal(a): >> Fixed tons of bugs and pushed. Please retry it again. >> >> Bye >> >> On Fri, Oct 9, 2015 at 3:55 PM, Miroslav Stampar >> <miroslav.stam...@gmail.com <mailto:miroslav.stam...@gmail.com>> >> wrote: >> >> Please wait a bit. There are tons of bugs for HSQLDB in >> sqlmap. On it right now. >> >> Bye >> >> On Fri, Oct 9, 2015 at 2:20 PM, Miroslav Stampar >> <miroslav.stam...@gmail.com >> <mailto:miroslav.stam...@gmail.com>> wrote: >> >> Hi again. >> >> Please update to the latest revision and retry it again >> (with --flush-session). >> >> Backend used is HSQLDB while the sqlmap wrongly >> recognized it as MySQL (because HSQLDB is MySQL look-alike) >> >> Bye >> >> On Fri, Oct 9, 2015 at 12:49 PM, Vojtěch Polášek >> <krec...@gmail.com <mailto:krec...@gmail.com>> wrote: >> >> Hi, >> You can download Webgoat here: >> >> https://webgoat.atlassian.net/builds/browse/WEB-WGM/latestSuccessful/artifact/shared/WebGoat-Embedded-Tomcat/WebGoat-6.0.1-war-exec.jar >> Just run java- jar WebGoat-6.0.1-war-exec.jar >> And you can login at localhost:8080/WebGoat with name >> webgoat and password webgoat >> The request file posted earlier is from Blind numeric >> SQL injection lesson. >> Application is written in Java and runs on embedded >> Tomcat 7 server. >> I am using this command, where "request" is request >> file posted earlier and valid_cookie is simply valid >> cookie. >> python2 /opt/sqlmap/sqlmap.py -r request --level=5 >> --risk=3 -o --cookie="JSESSIONID=valid_cookie' -v3 >> As I stated earlier, sqlmap finds the vulnerability >> but can't exploit it, I tried almost all tamper >> scripts, even some combinations, but no success. >> I wanted to show exploitation of Webgoat, because I >> would like to use Sqlmap for testing of commercial >> application which is based on similar technologies. >> Thank you, >> Vojta >> >> >> Dne 9.10.2015 v 11:16 Miroslav Stampar napsal(a): >>> Hi. >>> >>> Can you please send a used sqlmap command along with >>> the basic info on vulnerable environment (e.g. just >>> a plain Webgoat, URL this and that)? >>> >>> Bye >>> >>> On Thu, Oct 8, 2015 at 10:52 PM, Vojtěch Polášek >>> <krec...@gmail.com <mailto:krec...@gmail.com>> wrote: >>> >>> Greetings, >>> I am running Webgoat from standalone jar file, >>> so I can't see any logs. >>> I will try to see some logs from inside the >>> application. Anyway, I >>> didn't expect this application to contain any >>> kind of filtering. >>> I hope to show Sqlmap in action to some people >>> from a large company and >>> I wanted to use something simple, therefore I am >>> quite surprised. I have >>> never seen this situation - found injection but >>> no possibility of >>> exploitation. >>> The between tamper script didn't help. >>> Any suggestions are welcomed. >>> Thanks, >>> Vojta >>> >>> Dne 8.10.2015 v 18:10 Brandon Perry napsal(a): >>> > You should look in the logs of the web server >>> and see what they say. >>> > >>> > I bet you need --tamper=between >>> > >>> > Sent from a phone >>> > >>> >> On Oct 8, 2015, at 10:33 AM, Vojtěch Polášek >>> <krec...@gmail.com <mailto:krec...@gmail.com>> >>> wrote: >>> >> >>> >> Greetings, >>> >> I tried to verify Sqlmap's functionality by >>> running it against Webgoat >>> >> version 6.0.1. You can try it your self by >>> using following request file. >>> >> Just log in and replace cookie by valid one. >>> >> ###start request file >>> >> POST /WebGoat/attack?Screen=4&menu=1100 HTTP/1.1 >>> >> Host: localhost:8080 >>> >> User-Agent: Mozilla/5.0 (X11; Linux x86_64; >>> rv:41.0) Gecko/20100101 >>> >> Firefox/41.0 >>> >> Accept: */* >>> >> Accept-Language: cs,en-US;q=0.7,en;q=0.3 >>> >> Accept-Encoding: gzip, deflate >>> >> Content-Type: >>> application/x-www-form-urlencoded; charset=UTF-8 >>> >> X-Requested-With: XMLHttpRequest >>> >> Referer: http://localhost:8080/WebGoat/start.mvc >>> >> Content-Length: 29 >>> >> Cookie: JSESSIONID=replace >>> >> Connection: keep-alive >>> >> Pragma: no-cache >>> >> Cache-Control: no-cache >>> >> >>> >> account_number=101&SUBMIT=Go! >>> >> #end request file >>> >> I am running git master of Sqlmap. >>> >> Sqlmap detects SQL injection (boolean based >>> blind Mysql), but no >>> >> information gathering commands work (--dbs, >>> --current-user...). I tried >>> >> running with --hex or --no-cast, but no luck. >>> >> What might be the problem? >>> >> Thanks, >>> >> Vojta >>> >> >>> >> >>> >>> ------------------------------------------------------------------------------ >>> >> _______________________________________________ >>> >> sqlmap-users mailing list >>> >> sqlmap-users@lists.sourceforge.net >>> <mailto:sqlmap-users@lists.sourceforge.net> >>> >> >>> >>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>> >>> >>> >>> ------------------------------------------------------------------------------ >>> _______________________________________________ >>> sqlmap-users mailing list >>> sqlmap-users@lists.sourceforge.net >>> <mailto:sqlmap-users@lists.sourceforge.net> >>> >>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>> >>> >>> >>> >>> -- >>> Miroslav Stampar >>> http://about.me/stamparm >> >> >> >> ------------------------------------------------------------------------------ >> >> _______________________________________________ >> sqlmap-users mailing list >> sqlmap-users@lists.sourceforge.net >> <mailto:sqlmap-users@lists.sourceforge.net> >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >> >> >> >> >> -- >> Miroslav Stampar >> http://about.me/stamparm >> >> >> >> >> -- >> Miroslav Stampar >> http://about.me/stamparm >> >> >> >> >> -- >> Miroslav Stampar >> http://about.me/stamparm > > > > ------------------------------------------------------------------------------ > > _______________________________________________ > sqlmap-users mailing list > sqlmap-users@lists.sourceforge.net > <mailto:sqlmap-users@lists.sourceforge.net> > https://lists.sourceforge.net/lists/listinfo/sqlmap-users >
------------------------------------------------------------------------------
_______________________________________________ sqlmap-users mailing list sqlmap-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/sqlmap-users