Hi.

There has been a lot work here. Please update to the latest revision and
retry it again.

One word of advice regarding WebGoat. It has a bad routine that
automatically closes the SQLi after it finds certain keywords in requests.
Basically, afterwards it just says "* Congratulations. You have
successfully completed this lesson." and prevents further injection. Hence,
you'll need to use --safe-url and --safe-freq to reset those. Please find
details further in pastebin links.

Here you can find couple of different runs:

--technique=B
http://pastebin.com/04z2x00S

(no technique constraints)
http://pastebin.com/UhGQLyTp

Bye

On Tue, Oct 13, 2015 at 10:18 AM, Miroslav Stampar <
miroslav.stam...@gmail.com> wrote:

> Hi.
>
> There is still more work here to be done. Will let you know. I am going to
> try to finish it today.
>
> Bye
>
> On Tue, Oct 13, 2015 at 10:13 AM, Vojtěch Polášek <krec...@gmail.com>
> wrote:
>
>> Greetings,
>> I have still problems exploiting HSQL databases. current-user is still
>> returning garbled characters etc.
>> Is it still working for you?
>> Thanks,
>> Vojta
>>
>> Dne 10.10.2015 v 01:35 Miroslav Stampar napsal(a):
>>
>> I've used that same request file without any problems (with latest
>> patches/revision). Will retest tomorrow. Please retry everything with
>> --flush-session
>>
>> Bye
>> On Oct 10, 2015 1:17 AM, "Vojtěch Polášek" <krec...@gmail.com> wrote:
>>
>>> Greetings,
>>> thanks for your prompt response.
>>> Unfortunatelly, it is still not working as expected.
>>> There is problem with retrieving of current user and information from
>>> HSQL database in general.
>>> Moreover, when using following request file from the same application,
>>> Sqlmap identified backend database as Postgresql instead of HSQL.
>>> This request is from lesson about simple string SQL injection
>>> #begin request file
>>> POST /WebGoat/attack?Screen=36&menu=1100 HTTP/1.1
>>> Host: localhost:8080
>>> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:39.0) Gecko/20100101
>>> Firefox/39.0
>>> Accept: */*
>>> Accept-Language: cs,en-US;q=0.7,en;q=0.3
>>> Accept-Encoding: gzip, deflate
>>> Content-Type: application/x-www-form-urlencoded; charset=UTF-8
>>> X-Requested-With: XMLHttpRequest
>>> Referer: http://localhost:8080/WebGoat/start.mvc
>>> Content-Length: 29
>>> Connection: keep-alive
>>> Pragma: no-cache
>>> Cache-Control: no-cache
>>> Cookie: JSESSIONID=valid_cookie
>>>
>>> account_name=Smith&SUBMIT=Go!
>>> #end request
>>> Feel free to ask me for more debugging information, I will be glad to
>>> help you.
>>> Thanks for your work,
>>> Vojta
>>> Dne 9.10.2015 v 16:52 Miroslav Stampar napsal(a):
>>>
>>> Fixed tons of bugs and pushed. Please retry it again.
>>>
>>> Bye
>>>
>>> On Fri, Oct 9, 2015 at 3:55 PM, Miroslav Stampar <
>>> <miroslav.stam...@gmail.com>miroslav.stam...@gmail.com> wrote:
>>>
>>>> Please wait a bit. There are tons of bugs for HSQLDB in sqlmap. On it
>>>> right now.
>>>>
>>>> Bye
>>>>
>>>> On Fri, Oct 9, 2015 at 2:20 PM, Miroslav Stampar <
>>>> miroslav.stam...@gmail.com> wrote:
>>>>
>>>>> Hi again.
>>>>>
>>>>> Please update to the latest revision and retry it again (with
>>>>> --flush-session).
>>>>>
>>>>> Backend used is HSQLDB while the sqlmap wrongly recognized it as MySQL
>>>>> (because HSQLDB is MySQL look-alike)
>>>>>
>>>>> Bye
>>>>>
>>>>> On Fri, Oct 9, 2015 at 12:49 PM, Vojtěch Polášek < <krec...@gmail.com>
>>>>> krec...@gmail.com> wrote:
>>>>>
>>>>>> Hi,
>>>>>> You can download Webgoat here:
>>>>>>
>>>>>> https://webgoat.atlassian.net/builds/browse/WEB-WGM/latestSuccessful/artifact/shared/WebGoat-Embedded-Tomcat/WebGoat-6.0.1-war-exec.jar
>>>>>> Just run java- jar WebGoat-6.0.1-war-exec.jar
>>>>>> And you can login at localhost:8080/WebGoat with name webgoat and
>>>>>> password webgoat
>>>>>> The request file posted earlier is from Blind numeric SQL injection
>>>>>> lesson.
>>>>>> Application is written in Java and runs on embedded Tomcat 7 server.
>>>>>> I am using this command, where "request" is request file posted
>>>>>> earlier and valid_cookie is simply valid cookie.
>>>>>> python2 /opt/sqlmap/sqlmap.py -r request --level=5 --risk=3 -o
>>>>>> --cookie="JSESSIONID=valid_cookie' -v3
>>>>>> As I stated earlier, sqlmap finds the vulnerability but can't exploit
>>>>>> it, I tried almost all tamper scripts, even some combinations, but no
>>>>>> success.
>>>>>> I wanted to show exploitation of Webgoat, because I would like to use
>>>>>> Sqlmap for testing of commercial application which is based on similar
>>>>>> technologies.
>>>>>> Thank you,
>>>>>> Vojta
>>>>>>
>>>>>>
>>>>>> Dne 9.10.2015 v 11:16 Miroslav Stampar napsal(a):
>>>>>>
>>>>>> Hi.
>>>>>>
>>>>>> Can you please send a used sqlmap command along with the basic info
>>>>>> on vulnerable environment (e.g. just a plain Webgoat, URL this and that)?
>>>>>>
>>>>>> Bye
>>>>>>
>>>>>> On Thu, Oct 8, 2015 at 10:52 PM, Vojtěch Polášek <
>>>>>> <krec...@gmail.com>krec...@gmail.com> wrote:
>>>>>>
>>>>>>> Greetings,
>>>>>>> I am running Webgoat from standalone jar file, so I can't see any
>>>>>>> logs.
>>>>>>> I will try to see some logs from inside the application. Anyway, I
>>>>>>> didn't expect this application to contain any kind of filtering.
>>>>>>> I hope to show Sqlmap in action to some people from a large company
>>>>>>> and
>>>>>>> I wanted to use something simple, therefore I am quite surprised. I
>>>>>>> have
>>>>>>> never seen this situation - found injection but no possibility of
>>>>>>> exploitation.
>>>>>>> The between tamper script didn't help.
>>>>>>> Any suggestions are welcomed.
>>>>>>> Thanks,
>>>>>>> Vojta
>>>>>>>
>>>>>>> Dne 8.10.2015 v 18:10 Brandon Perry napsal(a):
>>>>>>> > You should look in the logs of the web server and see what they
>>>>>>> say.
>>>>>>> >
>>>>>>> > I bet you need --tamper=between
>>>>>>> >
>>>>>>> > Sent from a phone
>>>>>>> >
>>>>>>> >> On Oct 8, 2015, at 10:33 AM, Vojtěch Polášek <
>>>>>>> <krec...@gmail.com>krec...@gmail.com> wrote:
>>>>>>> >>
>>>>>>> >> Greetings,
>>>>>>> >> I tried to verify Sqlmap's functionality by running it against
>>>>>>> Webgoat
>>>>>>> >> version 6.0.1. You can try it your self by using following
>>>>>>> request file.
>>>>>>> >> Just log in and replace cookie by valid one.
>>>>>>> >> ###start request file
>>>>>>> >> POST /WebGoat/attack?Screen=4&menu=1100 HTTP/1.1
>>>>>>> >> Host: localhost:8080
>>>>>>> >> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:41.0)
>>>>>>> Gecko/20100101
>>>>>>> >> Firefox/41.0
>>>>>>> >> Accept: */*
>>>>>>> >> Accept-Language: cs,en-US;q=0.7,en;q=0.3
>>>>>>> >> Accept-Encoding: gzip, deflate
>>>>>>> >> Content-Type: application/x-www-form-urlencoded; charset=UTF-8
>>>>>>> >> X-Requested-With: XMLHttpRequest
>>>>>>> >> Referer: <http://localhost:8080/WebGoat/start.mvc>
>>>>>>> http://localhost:8080/WebGoat/start.mvc
>>>>>>> >> Content-Length: 29
>>>>>>> >> Cookie: JSESSIONID=replace
>>>>>>> >> Connection: keep-alive
>>>>>>> >> Pragma: no-cache
>>>>>>> >> Cache-Control: no-cache
>>>>>>> >>
>>>>>>> >> account_number=101&SUBMIT=Go!
>>>>>>> >> #end request file
>>>>>>> >> I am running git master of Sqlmap.
>>>>>>> >> Sqlmap detects SQL injection (boolean based blind Mysql), but no
>>>>>>> >> information gathering commands work (--dbs, --current-user...). I
>>>>>>> tried
>>>>>>> >> running with --hex or --no-cast, but no luck.
>>>>>>> >> What might be the problem?
>>>>>>> >> Thanks,
>>>>>>> >> Vojta
>>>>>>> >>
>>>>>>> >>
>>>>>>> ------------------------------------------------------------------------------
>>>>>>> >> _______________________________________________
>>>>>>> >> sqlmap-users mailing list
>>>>>>> >> <sqlmap-users@lists.sourceforge.net>
>>>>>>> sqlmap-users@lists.sourceforge.net
>>>>>>> >> <https://lists.sourceforge.net/lists/listinfo/sqlmap-users>
>>>>>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> ------------------------------------------------------------------------------
>>>>>>> _______________________________________________
>>>>>>> sqlmap-users mailing list
>>>>>>> <sqlmap-users@lists.sourceforge.net>
>>>>>>> sqlmap-users@lists.sourceforge.net
>>>>>>> <https://lists.sourceforge.net/lists/listinfo/sqlmap-users>
>>>>>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> --
>>>>>> Miroslav Stampar
>>>>>> <http://about.me/stamparm>http://about.me/stamparm
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> ------------------------------------------------------------------------------
>>>>>>
>>>>>> _______________________________________________
>>>>>> sqlmap-users mailing list
>>>>>> sqlmap-users@lists.sourceforge.net
>>>>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Miroslav Stampar
>>>>> http://about.me/stamparm
>>>>>
>>>>
>>>>
>>>>
>>>> --
>>>> Miroslav Stampar
>>>> http://about.me/stamparm
>>>>
>>>
>>>
>>>
>>> --
>>> Miroslav Stampar
>>> http://about.me/stamparm
>>>
>>>
>>>
>>>
>>> ------------------------------------------------------------------------------
>>>
>>> _______________________________________________
>>> sqlmap-users mailing list
>>> sqlmap-users@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>>
>>>
>>
>>
>> ------------------------------------------------------------------------------
>>
>> _______________________________________________
>> sqlmap-users mailing list
>> sqlmap-users@lists.sourceforge.net
>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users
>>
>>
>
>
> --
> Miroslav Stampar
> http://about.me/stamparm
>



-- 
Miroslav Stampar
http://about.me/stamparm
------------------------------------------------------------------------------
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to