- 21 Haz 2021
- 154
- 37
- 18
Merhaba sayın Turk Hack Team üyeleri kali linux sqlmap da hata alıyorum belki de hata değildir ben bilmiyorumdur
┌──(werty㉿Werty)-[~]
└─$ sqlmap -u SNEA India --dbs
___
__H__
___ ___[']_____ ___ ___ {1.5.2#stable}
|_ -| . [.] | .'| . |
|___|_ [.]_|_|_|__,| _|
|_|V... |_| sqlmap: automatic SQL injection and database takeover tool
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 12:56:15 /2021-07-23/
[12:56:16] [INFO] testing connection to the target URL
[12:56:19] [INFO] testing if the target URL content is stable
[12:56:22] [INFO] target URL content is stable
[12:56:22] [INFO] testing if GET parameter 'id' is dynamic
[12:56:24] [INFO] GET parameter 'id' appears to be dynamic
[12:56:32] [ERROR] possible integer casting detected (e.g. '$id=intval($_REQUEST["id"])') at the back-end web application
do you want to skip those kind of cases (and save scanning time)? [y/N] y
[12:59:21] [CRITICAL] unable to connect to the target URL. sqlmap is going to retry the request(s)
[12:59:25] [INFO] skipping GET parameter 'id'
[12:59:25] [CRITICAL] all tested parameters do not appear to be injectable. Try to increase values for '--level'/'--risk' options if you wish to perform more tests. If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could try to use option '--tamper' (e.g. '--tamper=space2comment') and/or switch '--random-agent'
[*] ending @ 12:59:25 /2021-07-23/
--dbs yazıyorum databaseleri gösterecek fakat böyle oluyor
( Çok FAzla SS Almaya Çalıştım Fakat Olmadı)
Not : Kali Linux 2021.1 Kullanıyorum
┌──(werty㉿Werty)-[~]
└─$ sqlmap -u SNEA India --dbs
___
__H__
___ ___[']_____ ___ ___ {1.5.2#stable}
|_ -| . [.] | .'| . |
|___|_ [.]_|_|_|__,| _|
|_|V... |_| sqlmap: automatic SQL injection and database takeover tool
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 12:56:15 /2021-07-23/
[12:56:16] [INFO] testing connection to the target URL
[12:56:19] [INFO] testing if the target URL content is stable
[12:56:22] [INFO] target URL content is stable
[12:56:22] [INFO] testing if GET parameter 'id' is dynamic
[12:56:24] [INFO] GET parameter 'id' appears to be dynamic
[12:56:32] [ERROR] possible integer casting detected (e.g. '$id=intval($_REQUEST["id"])') at the back-end web application
do you want to skip those kind of cases (and save scanning time)? [y/N] y
[12:59:21] [CRITICAL] unable to connect to the target URL. sqlmap is going to retry the request(s)
[12:59:25] [INFO] skipping GET parameter 'id'
[12:59:25] [CRITICAL] all tested parameters do not appear to be injectable. Try to increase values for '--level'/'--risk' options if you wish to perform more tests. If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could try to use option '--tamper' (e.g. '--tamper=space2comment') and/or switch '--random-agent'
[*] ending @ 12:59:25 /2021-07-23/
--dbs yazıyorum databaseleri gösterecek fakat böyle oluyor
( Çok FAzla SS Almaya Çalıştım Fakat Olmadı)
Not : Kali Linux 2021.1 Kullanıyorum