Yup. The master branch is a good branch. And you are having difficulties even if you use a --flush-session along with switches/options I've used?
This is strange. I've run this numerous times in last few days. Can you please send a complete console output as I've sent for my runs? Also, on which OS do you run WebGoat? Bye On Oct 13, 2015 6:50 PM, "Vojtěch Polášek" <krec...@gmail.com> wrote: > Greetings, > now it works but... > I don't know what am I doing wrong, but it takes very looong time for > Sqlmap to finish this run. In your output, it takes several seconds, for me > it takes almost a hour to get this done. > Also I found out that if I try to use --keep-alive, it is much faster, it > takes about a minute, but it again returns garbled characters. No other > optimization switches improve the speed. > I am using same arguments as you, but from enumeration arguments I am > using just --current-user, no --dump, --dbs etc. > Just to be sure, I am pulling from Master branch, is this correct? > Thank you very much for your efford, > Vojtěch Polášek > > > Dne 13.10.2015 v 13:07 Miroslav Stampar napsal(a): > > Hi. > > There has been a lot work here. Please update to the latest revision and > retry it again. > > One word of advice regarding WebGoat. It has a bad routine that > automatically closes the SQLi after it finds certain keywords in requests. > Basically, afterwards it just says "* Congratulations. You have > successfully completed this lesson." and prevents further injection. Hence, > you'll need to use --safe-url and --safe-freq to reset those. Please find > details further in pastebin links. > > Here you can find couple of different runs: > > --technique=B > http://pastebin.com/04z2x00S > > (no technique constraints) > http://pastebin.com/UhGQLyTp > > Bye > > On Tue, Oct 13, 2015 at 10:18 AM, Miroslav Stampar < > miroslav.stam...@gmail.com> wrote: > >> Hi. >> >> There is still more work here to be done. Will let you know. I am going >> to try to finish it today. >> >> Bye >> >> On Tue, Oct 13, 2015 at 10:13 AM, Vojtěch Polášek <krec...@gmail.com> >> wrote: >> >>> Greetings, >>> I have still problems exploiting HSQL databases. current-user is still >>> returning garbled characters etc. >>> Is it still working for you? >>> Thanks, >>> Vojta >>> >>> Dne 10.10.2015 v 01:35 Miroslav Stampar napsal(a): >>> >>> I've used that same request file without any problems (with latest >>> patches/revision). Will retest tomorrow. Please retry everything with >>> --flush-session >>> >>> Bye >>> On Oct 10, 2015 1:17 AM, "Vojtěch Polášek" <krec...@gmail.com> wrote: >>> >>>> Greetings, >>>> thanks for your prompt response. >>>> Unfortunatelly, it is still not working as expected. >>>> There is problem with retrieving of current user and information from >>>> HSQL database in general. >>>> Moreover, when using following request file from the same application, >>>> Sqlmap identified backend database as Postgresql instead of HSQL. >>>> This request is from lesson about simple string SQL injection >>>> #begin request file >>>> POST /WebGoat/attack?Screen=36&menu=1100 HTTP/1.1 >>>> Host: localhost:8080 >>>> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:39.0) Gecko/20100101 >>>> Firefox/39.0 >>>> Accept: */* >>>> Accept-Language: cs,en-US;q=0.7,en;q=0.3 >>>> Accept-Encoding: gzip, deflate >>>> Content-Type: application/x-www-form-urlencoded; charset=UTF-8 >>>> X-Requested-With: XMLHttpRequest >>>> Referer: http://localhost:8080/WebGoat/start.mvc >>>> Content-Length: 29 >>>> Connection: keep-alive >>>> Pragma: no-cache >>>> Cache-Control: no-cache >>>> Cookie: JSESSIONID=valid_cookie >>>> >>>> account_name=Smith&SUBMIT=Go! >>>> #end request >>>> Feel free to ask me for more debugging information, I will be glad to >>>> help you. >>>> Thanks for your work, >>>> Vojta >>>> Dne 9.10.2015 v 16:52 Miroslav Stampar napsal(a): >>>> >>>> Fixed tons of bugs and pushed. Please retry it again. >>>> >>>> Bye >>>> >>>> On Fri, Oct 9, 2015 at 3:55 PM, Miroslav Stampar < >>>> miroslav.stam...@gmail.com> wrote: >>>> >>>>> Please wait a bit. There are tons of bugs for HSQLDB in sqlmap. On it >>>>> right now. >>>>> >>>>> Bye >>>>> >>>>> On Fri, Oct 9, 2015 at 2:20 PM, Miroslav Stampar < >>>>> miroslav.stam...@gmail.com> wrote: >>>>> >>>>>> Hi again. >>>>>> >>>>>> Please update to the latest revision and retry it again (with >>>>>> --flush-session). >>>>>> >>>>>> Backend used is HSQLDB while the sqlmap wrongly recognized it as >>>>>> MySQL (because HSQLDB is MySQL look-alike) >>>>>> >>>>>> Bye >>>>>> >>>>>> On Fri, Oct 9, 2015 at 12:49 PM, Vojtěch Polášek <krec...@gmail.com> >>>>>> wrote: >>>>>> >>>>>>> Hi, >>>>>>> You can download Webgoat here: >>>>>>> >>>>>>> https://webgoat.atlassian.net/builds/browse/WEB-WGM/latestSuccessful/artifact/shared/WebGoat-Embedded-Tomcat/WebGoat-6.0.1-war-exec.jar >>>>>>> Just run java- jar WebGoat-6.0.1-war-exec.jar >>>>>>> And you can login at localhost:8080/WebGoat with name webgoat and >>>>>>> password webgoat >>>>>>> The request file posted earlier is from Blind numeric SQL injection >>>>>>> lesson. >>>>>>> Application is written in Java and runs on embedded Tomcat 7 server. >>>>>>> I am using this command, where "request" is request file posted >>>>>>> earlier and valid_cookie is simply valid cookie. >>>>>>> python2 /opt/sqlmap/sqlmap.py -r request --level=5 --risk=3 -o >>>>>>> --cookie="JSESSIONID=valid_cookie' -v3 >>>>>>> As I stated earlier, sqlmap finds the vulnerability but can't >>>>>>> exploit it, I tried almost all tamper scripts, even some combinations, >>>>>>> but >>>>>>> no success. >>>>>>> I wanted to show exploitation of Webgoat, because I would like to >>>>>>> use Sqlmap for testing of commercial application which is based on >>>>>>> similar >>>>>>> technologies. >>>>>>> Thank you, >>>>>>> Vojta >>>>>>> >>>>>>> >>>>>>> Dne 9.10.2015 v 11:16 Miroslav Stampar napsal(a): >>>>>>> >>>>>>> Hi. >>>>>>> >>>>>>> Can you please send a used sqlmap command along with the basic info >>>>>>> on vulnerable environment (e.g. just a plain Webgoat, URL this and >>>>>>> that)? >>>>>>> >>>>>>> Bye >>>>>>> >>>>>>> On Thu, Oct 8, 2015 at 10:52 PM, Vojtěch Polášek <krec...@gmail.com> >>>>>>> wrote: >>>>>>> >>>>>>>> Greetings, >>>>>>>> I am running Webgoat from standalone jar file, so I can't see any >>>>>>>> logs. >>>>>>>> I will try to see some logs from inside the application. Anyway, I >>>>>>>> didn't expect this application to contain any kind of filtering. >>>>>>>> I hope to show Sqlmap in action to some people from a large company >>>>>>>> and >>>>>>>> I wanted to use something simple, therefore I am quite surprised. I >>>>>>>> have >>>>>>>> never seen this situation - found injection but no possibility of >>>>>>>> exploitation. >>>>>>>> The between tamper script didn't help. >>>>>>>> Any suggestions are welcomed. >>>>>>>> Thanks, >>>>>>>> Vojta >>>>>>>> >>>>>>>> Dne 8.10.2015 v 18:10 Brandon Perry napsal(a): >>>>>>>> > You should look in the logs of the web server and see what they >>>>>>>> say. >>>>>>>> > >>>>>>>> > I bet you need --tamper=between >>>>>>>> > >>>>>>>> > Sent from a phone >>>>>>>> > >>>>>>>> >> On Oct 8, 2015, at 10:33 AM, Vojtěch Polášek <krec...@gmail.com> >>>>>>>> wrote: >>>>>>>> >> >>>>>>>> >> Greetings, >>>>>>>> >> I tried to verify Sqlmap's functionality by running it against >>>>>>>> Webgoat >>>>>>>> >> version 6.0.1. You can try it your self by using following >>>>>>>> request file. >>>>>>>> >> Just log in and replace cookie by valid one. >>>>>>>> >> ###start request file >>>>>>>> >> POST /WebGoat/attack?Screen=4&menu=1100 HTTP/1.1 >>>>>>>> >> Host: localhost:8080 >>>>>>>> >> User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:41.0) >>>>>>>> Gecko/20100101 >>>>>>>> >> Firefox/41.0 >>>>>>>> >> Accept: */* >>>>>>>> >> Accept-Language: cs,en-US;q=0.7,en;q=0.3 >>>>>>>> >> Accept-Encoding: gzip, deflate >>>>>>>> >> Content-Type: application/x-www-form-urlencoded; charset=UTF-8 >>>>>>>> >> X-Requested-With: XMLHttpRequest >>>>>>>> >> Referer: http://localhost:8080/WebGoat/start.mvc >>>>>>>> >> Content-Length: 29 >>>>>>>> >> Cookie: JSESSIONID=replace >>>>>>>> >> Connection: keep-alive >>>>>>>> >> Pragma: no-cache >>>>>>>> >> Cache-Control: no-cache >>>>>>>> >> >>>>>>>> >> account_number=101&SUBMIT=Go! >>>>>>>> >> #end request file >>>>>>>> >> I am running git master of Sqlmap. >>>>>>>> >> Sqlmap detects SQL injection (boolean based blind Mysql), but no >>>>>>>> >> information gathering commands work (--dbs, --current-user...). >>>>>>>> I tried >>>>>>>> >> running with --hex or --no-cast, but no luck. >>>>>>>> >> What might be the problem? >>>>>>>> >> Thanks, >>>>>>>> >> Vojta >>>>>>>> >> >>>>>>>> >> >>>>>>>> ------------------------------------------------------------------------------ >>>>>>>> >> _______________________________________________ >>>>>>>> >> sqlmap-users mailing list >>>>>>>> >> sqlmap-users@lists.sourceforge.net >>>>>>>> >> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> ------------------------------------------------------------------------------ >>>>>>>> _______________________________________________ >>>>>>>> sqlmap-users mailing list >>>>>>>> sqlmap-users@lists.sourceforge.net >>>>>>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> -- >>>>>>> Miroslav Stampar >>>>>>> http://about.me/stamparm >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> ------------------------------------------------------------------------------ >>>>>>> >>>>>>> _______________________________________________ >>>>>>> sqlmap-users mailing list >>>>>>> sqlmap-users@lists.sourceforge.net >>>>>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>>>>>> >>>>>>> >>>>>> >>>>>> >>>>>> -- >>>>>> Miroslav Stampar >>>>>> http://about.me/stamparm >>>>>> >>>>> >>>>> >>>>> >>>>> -- >>>>> Miroslav Stampar >>>>> http://about.me/stamparm >>>>> >>>> >>>> >>>> >>>> -- >>>> Miroslav Stampar >>>> http://about.me/stamparm >>>> >>>> >>>> >>>> >>>> ------------------------------------------------------------------------------ >>>> >>>> _______________________________________________ >>>> sqlmap-users mailing list >>>> sqlmap-users@lists.sourceforge.net >>>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>>> >>>> >>> >>> >>> ------------------------------------------------------------------------------ >>> >>> _______________________________________________ >>> sqlmap-users mailing list >>> sqlmap-users@lists.sourceforge.net >>> https://lists.sourceforge.net/lists/listinfo/sqlmap-users >>> >>> >> >> >> -- >> Miroslav Stampar >> http://about.me/stamparm >> > > > > -- > Miroslav Stampar > http://about.me/stamparm > > > > > ------------------------------------------------------------------------------ > > _______________________________________________ > sqlmap-users mailing list > sqlmap-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > >
------------------------------------------------------------------------------
_______________________________________________ sqlmap-users mailing list sqlmap-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/sqlmap-users