|
3354 | 3354 | <item value="r'performed 112 queries'" console_output="True"/> |
3355 | 3355 | </parse> |
3356 | 3356 | </case> |
| 3357 | + <case name="Hex conversion data retrival"> |
| 3358 | + <switches> |
| 3359 | + <url value="http://debiandev/sqlmap/mysql/get_int.php?id=1"/> |
| 3360 | + <threads value="4"/> |
| 3361 | + <tech value="E"/> |
| 3362 | + <extensiveFp value="True"/> |
| 3363 | + <getBanner value="True"/> |
| 3364 | + <getCurrentUser value="True"/> |
| 3365 | + <getCurrentDb value="True"/> |
| 3366 | + <getHostname value="True"/> |
| 3367 | + <hexConvert value="True"/> |
| 3368 | + <isDba value="True"/> |
| 3369 | + <getUsers value="True"/> |
| 3370 | + <getPasswordHashes value="True"/> |
| 3371 | + <getPrivileges value="True"/> |
| 3372 | + <getRoles value="True"/> |
| 3373 | + <getDbs value="True"/> |
| 3374 | + <getTables value="True"/> |
| 3375 | + <getColumns value="True"/> |
| 3376 | + <getCount value="True"/> |
| 3377 | + <dumpTable value="True"/> |
| 3378 | + <db value="testdb"/> |
| 3379 | + <tbl value="users"/> |
| 3380 | + <excludeSysDbs value="True"/> |
| 3381 | + <answers value="do you want to perform a dictionary-based attack against retrieved password hashes=N"/> |
| 3382 | + </switches> |
| 3383 | + <parse> |
| 3384 | + <item value="Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause"/> |
| 3385 | + <item value="r'back-end DBMS: active fingerprint: MySQL >= 5.1.12 and < 5.5.0'"/> |
| 3386 | + <item value="banner: '5.1.66-0+squeeze1'"/> |
| 3387 | + <item value="current user: 'root@localhost'"/> |
| 3388 | + <item value="current database: 'testdb'"/> |
| 3389 | + <item value="hostname: 'debian"/> |
| 3390 | + <item value="current user is DBA: True"/> |
| 3391 | + <item value="r'database management system users \[.+'debian-sys-maint'@'localhost'.+'root'@''"/> |
| 3392 | + <item value="r'database management system users password hashes:.+root \[.+password hash: \*00E247AC5F9AF26AE0194B41E1E769DEE1429A29'"/> |
| 3393 | + <item value="r'database management system users privileges:.+debian-sys-maint.+\(administrator\).+root.+\(administrator\).+privilege: SUPER'"/> |
| 3394 | + <item value="r'database management system users roles:.+debian-sys-maint.+\(administrator\).+root.+\(administrator\).+role: SUPER'"/> |
| 3395 | + <item value="r'available databases \[.+information_schema.+mysql.+testdb'"/> |
| 3396 | + <item value="r'Database: testdb.+3 tables.+users'"/> |
| 3397 | + <item value="r'Database: testdb.+Table: users.+3 columns.+surname.+varchar\(1000\)'"/> |
| 3398 | + <item value="r'Database: testdb.+Table.+Entries.+users.+5'"/> |
| 3399 | + <item value="r'Database: testdb.+Table: users.+5 entries.+luther.+nameisnull.+'"/> |
| 3400 | + </parse> |
| 3401 | + </case> |
3357 | 3402 | <case name="Custom GET parameter injection mark"> |
3358 | 3403 | <switches> |
3359 | 3404 | <verbose value="2"/> |
|
0 commit comments