Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 742c66f

Browse files
committed
Adding one more test (switch --hex)
1 parent f33bf06 commit 742c66f

1 file changed

Lines changed: 45 additions & 0 deletions

File tree

xml/livetests.xml

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3354,6 +3354,51 @@
33543354
<item value="r'performed 112 queries'" console_output="True"/>
33553355
</parse>
33563356
</case>
3357+
<case name="Hex conversion data retrival">
3358+
<switches>
3359+
<url value="http://debiandev/sqlmap/mysql/get_int.php?id=1"/>
3360+
<threads value="4"/>
3361+
<tech value="E"/>
3362+
<extensiveFp value="True"/>
3363+
<getBanner value="True"/>
3364+
<getCurrentUser value="True"/>
3365+
<getCurrentDb value="True"/>
3366+
<getHostname value="True"/>
3367+
<hexConvert value="True"/>
3368+
<isDba value="True"/>
3369+
<getUsers value="True"/>
3370+
<getPasswordHashes value="True"/>
3371+
<getPrivileges value="True"/>
3372+
<getRoles value="True"/>
3373+
<getDbs value="True"/>
3374+
<getTables value="True"/>
3375+
<getColumns value="True"/>
3376+
<getCount value="True"/>
3377+
<dumpTable value="True"/>
3378+
<db value="testdb"/>
3379+
<tbl value="users"/>
3380+
<excludeSysDbs value="True"/>
3381+
<answers value="do you want to perform a dictionary-based attack against retrieved password hashes=N"/>
3382+
</switches>
3383+
<parse>
3384+
<item value="Title: MySQL &gt;= 5.0 AND error-based - WHERE or HAVING clause"/>
3385+
<item value="r'back-end DBMS: active fingerprint: MySQL &gt;= 5.1.12 and &lt; 5.5.0'"/>
3386+
<item value="banner: '5.1.66-0+squeeze1'"/>
3387+
<item value="current user: 'root@localhost'"/>
3388+
<item value="current database: 'testdb'"/>
3389+
<item value="hostname: 'debian"/>
3390+
<item value="current user is DBA: True"/>
3391+
<item value="r'database management system users \[.+'debian-sys-maint'@'localhost'.+'root'@''"/>
3392+
<item value="r'database management system users password hashes:.+root \[.+password hash: \*00E247AC5F9AF26AE0194B41E1E769DEE1429A29'"/>
3393+
<item value="r'database management system users privileges:.+debian-sys-maint.+\(administrator\).+root.+\(administrator\).+privilege: SUPER'"/>
3394+
<item value="r'database management system users roles:.+debian-sys-maint.+\(administrator\).+root.+\(administrator\).+role: SUPER'"/>
3395+
<item value="r'available databases \[.+information_schema.+mysql.+testdb'"/>
3396+
<item value="r'Database: testdb.+3 tables.+users'"/>
3397+
<item value="r'Database: testdb.+Table: users.+3 columns.+surname.+varchar\(1000\)'"/>
3398+
<item value="r'Database: testdb.+Table.+Entries.+users.+5'"/>
3399+
<item value="r'Database: testdb.+Table: users.+5 entries.+luther.+nameisnull.+'"/>
3400+
</parse>
3401+
</case>
33573402
<case name="Custom GET parameter injection mark">
33583403
<switches>
33593404
<verbose value="2"/>

0 commit comments

Comments
 (0)