Project

General

Profile

Actions

Support #3620

closed

Vulnerability Test

Added by Benjamin Baer about 7 years ago. Updated almost 7 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Carsten Rose
Target version:
-
Start date:
24.04.2017
Due date:
% Done:

0%

Estimated time:
Discuss:
Prio Planung:
Vote:

Description

Neuste Version von sqlmap aus github klonen:

git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev

Use:

python sqlmap.py -u "http://qfq.math.uzh.ch/crose/qfq-jqw/index.php?id=6&search=test#" -f --banner --dbms=mysql --risk=3 --level=5 --batch -p=search --os=linux

Zusaetzlich kann man noch --forms anfuegen, falls die Seite ein Form hat das er versuchen soll zu testen.

Vorsicht: Risk=3 heisst auch, das es ein Risiko gibt das die Tests, falls erfolgreich, die Datenbank beschaedigen.

Actions #1

Updated by Benjamin Baer about 7 years ago

Actions #2

Updated by Carsten Rose about 7 years ago

  • Status changed from New to In Progress
  • Assignee set to Carsten Rose

sqlmap (lokal installiert) und xsser (VM Kali) gegen die DEV Instanz laufen gelassen - keine Probleme gefunden.

Actions #3

Updated by Benjamin Baer almost 7 years ago

Bei Langeweile:

Ein Artikel wie man komplexere Angriffe mit sqlmap testen kann.

http://www.thegreycorner.com/2017/01/exploiting-difficult-sql-injection.html

Simples update fuer unseren Test string:

Other options

Some other options I commonly use are the parameter option which specifies which parameter is used to perform the injection (e.g. -p 'vulnerable_parameter') and the options to specify the database (e.g. --dbms='mysql') and the Operating System (--os='linux') in use on the remote server. These all help sqlmap to avoid making extraneous requests beyond what you already know will be effective based on your knowledge of the target web application. Sometimes of course the injection point is not within a parameter, in which case sqlmap has other options which can be used to target its operation, such as the asterisk character (*) which can be used to set manual injection point within a request.

Actions #4

Updated by Benjamin Baer almost 7 years ago

  • Description updated (diff)
Actions #5

Updated by Carsten Rose almost 7 years ago

  • Status changed from In Progress to Closed
Actions

Also available in: Atom PDF