Hi.

There is still more work here to be done. Will let you know. I am going to
try to finish it today.

Bye

On Tue, Oct 13, 2015 at 10:13 AM, Vojtěch Polášek <krec...@gmail.com> wrote:

> Greetings,
> I have still problems exploiting HSQL databases. current-user is still
> returning garbled characters etc.
> Is it still working for you?
> Thanks,
> Vojta
>
> Dne 10.10.2015 v 01:35 Miroslav Stampar napsal(a):
>
> I've used that same request file without any problems (with latest
> patches/revision). Will retest tomorrow. Please retry everything with
> --flush-session
>
> Bye
> On Oct 10, 2015 1:17 AM, "Vojtěch Polášek" <krec...@gmail.com> wrote:
>
>> Greetings,
>> thanks for your prompt response.
>> Unfortunatelly, it is still not working as expected.
>> There is problem with retrieving of current user and information from
>> HSQL database in general.
>> Moreover, when using following request file from the same application,
>> Sqlmap identified backend database as Postgresql instead of HSQL.
>> This request is from lesson about simple string SQL injection
>> #begin request file
>> POST /WebGoat/attack?Screen=36&menu=1100 HTTP/1.1
>> Host: localhost:8080
>> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:39.0) Gecko/20100101
>> Firefox/39.0
>> Accept: */*
>> Accept-Language: cs,en-US;q=0.7,en;q=0.3
>> Accept-Encoding: gzip, deflate
>> Content-Type: application/x-www-form-urlencoded; charset=UTF-8
>> X-Requested-With: XMLHttpRequest
>> Referer: http://localhost:8080/WebGoat/start.mvc
>> Content-Length: 29
>> Connection: keep-alive
>> Pragma: no-cache
>> Cache-Control: no-cache
>> Cookie: JSESSIONID=valid_cookie
>>
>> account_name=Smith&SUBMIT=Go!
>> #end request
>> Feel free to ask me for more debugging information, I will be glad to
>> help you.
>> Thanks for your work,
>> Vojta
>> Dne 9.10.2015 v 16:52 Miroslav Stampar napsal(a):
>>
>> Fixed tons of bugs and pushed. Please retry it again.
>>
>> Bye
>>
>> On Fri, Oct 9, 2015 at 3:55 PM, Miroslav Stampar <
>> <miroslav.stam...@gmail.com>miroslav.stam...@gmail.com> wrote:
>>
>>> Please wait a bit. There are tons of bugs for HSQLDB in sqlmap. On it
>>> right now.
>>>
>>> Bye
>>>
>>> On Fri, Oct 9, 2015 at 2:20 PM, Miroslav Stampar <
>>> miroslav.stam...@gmail.com> wrote:
>>>
>>>> Hi again.
>>>>
>>>> Please update to the latest revision and retry it again (with
>>>> --flush-session).
>>>>
>>>> Backend used is HSQLDB while the sqlmap wrongly recognized it as MySQL
>>>> (because HSQLDB is MySQL look-alike)
>>>>
>>>> Bye
>>>>
>>>> On Fri, Oct 9, 2015 at 12:49 PM, Vojtěch Polášek < <krec...@gmail.com>
>>>> krec...@gmail.com> wrote:
>>>>
>>>>> Hi,
>>>>> You can download Webgoat here:
>>>>>
>>>>> https://webgoat.atlassian.net/builds/browse/WEB-WGM/latestSuccessful/artifact/shared/WebGoat-Embedded-Tomcat/WebGoat-6.0.1-war-exec.jar
>>>>> Just run java- jar WebGoat-6.0.1-war-exec.jar
>>>>> And you can login at localhost:8080/WebGoat with name webgoat and
>>>>> password webgoat
>>>>> The request file posted earlier is from Blind numeric SQL injection
>>>>> lesson.
>>>>> Application is written in Java and runs on embedded Tomcat 7 server.
>>>>> I am using this command, where "request" is request file posted
>>>>> earlier and valid_cookie is simply valid cookie.
>>>>> python2 /opt/sqlmap/sqlmap.py -r request --level=5 --risk=3 -o
>>>>> --cookie="JSESSIONID=valid_cookie' -v3
>>>>> As I stated earlier, sqlmap finds the vulnerability but can't exploit
>>>>> it, I tried almost all tamper scripts, even some combinations, but no
>>>>> success.
>>>>> I wanted to show exploitation of Webgoat, because I would like to use
>>>>> Sqlmap for testing of commercial application which is based on similar
>>>>> technologies.
>>>>> Thank you,
>>>>> Vojta
>>>>>
>>>>>
>>>>> Dne 9.10.2015 v 11:16 Miroslav Stampar napsal(a):
>>>>>
>>>>> Hi.
>>>>>
>>>>> Can you please send a used sqlmap command along with the basic info on
>>>>> vulnerable environment (e.g. just a plain Webgoat, URL this and that)?
>>>>>
>>>>> Bye
>>>>>
>>>>> On Thu, Oct 8, 2015 at 10:52 PM, Vojtěch Polášek < <krec...@gmail.com>
>>>>> krec...@gmail.com> wrote:
>>>>>
>>>>>> Greetings,
>>>>>> I am running Webgoat from standalone jar file, so I can't see any
>>>>>> logs.
>>>>>> I will try to see some logs from inside the application. Anyway, I
>>>>>> didn't expect this application to contain any kind of filtering.
>>>>>> I hope to show Sqlmap in action to some people from a large company
>>>>>> and
>>>>>> I wanted to use something simple, therefore I am quite surprised. I
>>>>>> have
>>>>>> never seen this situation - found injection but no possibility of
>>>>>> exploitation.
>>>>>> The between tamper script didn't help.
>>>>>> Any suggestions are welcomed.
>>>>>> Thanks,
>>>>>> Vojta
>>>>>>
>>>>>> Dne 8.10.2015 v 18:10 Brandon Perry napsal(a):
>>>>>> > You should look in the logs of the web server and see what they say.
>>>>>> >
>>>>>> > I bet you need --tamper=between
>>>>>> >
>>>>>> > Sent from a phone
>>>>>> >
>>>>>> >> On Oct 8, 2015, at 10:33 AM, Vojtěch Polášek < <krec...@gmail.com>
>>>>>> krec...@gmail.com> wrote:
>>>>>> >>
>>>>>> >> Greetings,
>>>>>> >> I tried to verify Sqlmap's functionality by running it against
>>>>>> Webgoat
>>>>>> >> version 6.0.1. You can try it your self by using following request
>>>>>> file.
>>>>>> >> Just log in and replace cookie by valid one.
>>>>>> >> ###start request file
>>>>>> >> POST /WebGoat/attack?Screen=4&menu=1100 HTTP/1.1
>>>>>> >> Host: localhost:8080
>>>>>> >> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:41.0) Gecko/20100101
>>>>>> >> Firefox/41.0
>>>>>> >> Accept: */*
>>>>>> >> Accept-Language: cs,en-US;q=0.7,en;q=0.3
>>>>>> >> Accept-Encoding: gzip, deflate
>>>>>> >> Content-Type: application/x-www-form-urlencoded; charset=UTF-8
>>>>>> >> X-Requested-With: XMLHttpRequest
>>>>>> >> Referer: <http://localhost:8080/WebGoat/start.mvc>
>>>>>> http://localhost:8080/WebGoat/start.mvc
>>>>>> >> Content-Length: 29
>>>>>> >> Cookie: JSESSIONID=replace
>>>>>> >> Connection: keep-alive
>>>>>> >> Pragma: no-cache
>>>>>> >> Cache-Control: no-cache
>>>>>> >>
>>>>>> >> account_number=101&SUBMIT=Go!
>>>>>> >> #end request file
>>>>>> >> I am running git master of Sqlmap.
>>>>>> >> Sqlmap detects SQL injection (boolean based blind Mysql), but no
>>>>>> >> information gathering commands work (--dbs, --current-user...). I
>>>>>> tried
>>>>>> >> running with --hex or --no-cast, but no luck.
>>>>>> >> What might be the problem?
>>>>>> >> Thanks,
>>>>>> >> Vojta
>>>>>> >>
>>>>>> >>
>>>>>> ------------------------------------------------------------------------------
>>>>>> >> _______________________________________________
>>>>>> >> sqlmap-users mailing list
>>>>>> >> <sqlmap-users@lists.sourceforge.net>
>>>>>> sqlmap-users@lists.sourceforge.net
>>>>>> >> <https://lists.sourceforge.net/lists/listinfo/sqlmap-users>
>>>>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>>>>
>>>>>>
>>>>>>
>>>>>> ------------------------------------------------------------------------------
>>>>>> _______________________________________________
>>>>>> sqlmap-users mailing list
>>>>>> <sqlmap-users@lists.sourceforge.net>
>>>>>> sqlmap-users@lists.sourceforge.net
>>>>>> <https://lists.sourceforge.net/lists/listinfo/sqlmap-users>
>>>>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Miroslav Stampar
>>>>> <http://about.me/stamparm>http://about.me/stamparm
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> ------------------------------------------------------------------------------
>>>>>
>>>>> _______________________________________________
>>>>> sqlmap-users mailing list
>>>>> sqlmap-users@lists.sourceforge.net
>>>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>>>
>>>>>
>>>>
>>>>
>>>> --
>>>> Miroslav Stampar
>>>> http://about.me/stamparm
>>>>
>>>
>>>
>>>
>>> --
>>> Miroslav Stampar
>>> http://about.me/stamparm
>>>
>>
>>
>>
>> --
>> Miroslav Stampar
>> http://about.me/stamparm
>>
>>
>>
>>
>> ------------------------------------------------------------------------------
>>
>> _______________________________________________
>> sqlmap-users mailing list
>> sqlmap-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>
>>
>
>
> ------------------------------------------------------------------------------
>
> _______________________________________________
> sqlmap-users mailing list
> sqlmap-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>
>


-- 
Miroslav Stampar
http://about.me/stamparm
------------------------------------------------------------------------------
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to