Marthe,

On Wed, Jul 22, 2009 at 11:51 AM, Marthe
Engebretsen<[email protected]> wrote:
>
>
> -----Original Message-----
> From: Andres Riancho [mailto:[email protected]]
> Sent: Monday, July 20, 2009 4:27 PM
> To: Marthe Engebretsen
> Cc: [email protected]
> Subject: Re: [W3af-users] Blind SQL plugin - Too many retries
>
> Marthe,
>
> On Mon, Jul 20, 2009 at 11:22 AM, Marthe
> Engebretsen<[email protected]> wrote:
>> Andrés,
>>
>> Marthe,
>>
>> On Mon, Jul 20, 2009 at 10:20 AM, Marthe
>> Engebretsen<[email protected]> wrote:
>>> Dear list,
>>>
>>> I've been testing W3AF for some weeks now, as part of a large project
>>> concerning web application security and web application vulnerability
>>> scanning.  W3AF is one of my absolute favorites of the tools tested, but
>>> recently I've got some problems when scanning my "known vulnerable test
>>> site" for SQL Injections.
>>>
>>> In order to check how the tool manage blind SQL injections my  test site has
>>> been modified to not show database error messages (MySQL-database). When the
>>> blindSqli plugin is enabled it only returns:" Too many retries when trying
>>> to get: . URL.". I've tried to tune both blindSqli-plugin settings and
>>> http-settings, but I still get the same result.
>>>
>>> Any ideas on what the problem is, and how to get the plugin to work
>>> properly?
>>
>> Are you using some kind of IPS, that could be closing TCP connections
>> based on the packet payloads?
>>
>> No, there are no IPS. The test server is only protected by IP restrictions.
>
> Then I have no clue of what could be happening, I would need more
> information, logs, etc. to be able to try to find what's happening.
> Have you tried to use wireshark to see what's going bad at a TCP/IP
> level? Usually these type of errors are because of connection errors
> at that level. Maybe packets are being dropped?
>
> Another idea: maybe you could run w3af with the output.textFile plugin
> with the verbose parameter set to true, and analyze that?
>
> ---
> I've had a look in the verbose textFile and found some interesting results, 
> even though it's not related to the "too many retries"-problem.
>
> Why is this vulnerability just marked as "debug":
> [ 07/21/09 09:38:39 - debug ] GET http://testsite/index.php?p=movie&id=4 OR 
> 29=29  returned HTTP code "200" - id: 3728
> [ 07/21/09 09:38:39 - debug ] GET http://testsite/index.php?p=movie&id=4 AND 
> 29=30  returned HTTP code "200" - id: 3729
> [ 07/21/09 09:38:39 - debug ] Comparing secondTrueResponse and trueResponse.
> [ 07/21/09 09:38:39 - debug ] Pages are equal, match rate: 0.991228070175
> [ 07/21/09 09:38:39 - debug ] Comparing secondFalseResponse and falseResponse.
> [ 07/21/09 09:38:39 - debug ] Pages are equal, match rate: 0.979166666667
> [ 07/21/09 09:38:39 - debug ] Blind SQL injection was found at: 
> "http://testsite/index.php";, using HTTP method GET. The injectable parameter 
> is: "id". This vulnerability was found in the requests with ids 3728 and 3729.
>
> While this vulnerability is marked as "vulnerability":
> [ 07/21/09 09:47:21 - debug ] GET http://testsite/index.php?comment=1 or 
> BENCHMARK(2500000,MD5(1))&p=movie&id=5 returned HTTP code "200" - id: 4268
> [ 07/21/09 09:47:21 - vulnerability ] Blind SQL injection was found at: 
> "http://testsite/index.php";, using HTTP method GET. The sent data was: 
> "comment=1+or+BENCHMARK%282500000%2CMD5%281%29%29&p=movie&id=5". The modified 
> parameter was "comment". This vulnerability was found in the request with id 
> 4268.
>
> Is there a good explanation for this, or is it a bug?

I think that you should see the same line, but with a vulnerability
tag some lines below. Please let me know if you don't find it.

Cheers,

> Cheers,
> Marthe Engebretsen
>
>
>>
>>>
>>> ------------------------------------------------------------------------------
>>> Enter the BlackBerry Developer Challenge
>>> This is your chance to win up to $100,000 in prizes! For a limited time,
>>> vendors submitting new applications to BlackBerry App World(TM) will have
>>> the opportunity to enter the BlackBerry Developer Challenge. See full prize
>>> details at: http://p.sf.net/sfu/Challenge
>>> _______________________________________________
>>> W3af-users mailing list
>>> [email protected]
>>> https://lists.sourceforge.net/lists/listinfo/w3af-users
>>>
>>>
>>
>>
>>
>> --
>> Andrés Riancho
>> Founder, Bonsai - Information Security
>> http://www.bonsai-sec.com/
>> http://w3af.sf.net/
>>
>
>
>
> --
> Andrés Riancho
> Founder, Bonsai - Information Security
> http://www.bonsai-sec.com/
> http://w3af.sf.net/
>



-- 
Andrés Riancho
Founder, Bonsai - Information Security
http://www.bonsai-sec.com/
http://w3af.sf.net/

------------------------------------------------------------------------------
_______________________________________________
W3af-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to