Update:
Command:
./sqlmap.py -u "http://www..org:80/php"; --forms --batch
--technique=U -pfield --dump-all --exclude-sysdbs > DUMP
This produces normal. "trimmed" dumps to console.
Then, after cracking hashes:
[INFO] cracked password 'password1' for user 'user1'
[INFO] current stat
Command:
./sqlmap.py -u "http://www..XXX:80/SOME.php"; --forms --technique=U
-pNULL --dump -T TABLE01 -D DB
The command completes with no errors, and the contents are dumped to
console (abbreviated, as normal), however; the /output/domain/dump/
directory remains empty. Need traffic.log?
sqlmap version: 1.0-dev (r4542)
Python version: 2.6.5
Operating system: posix
Command line: ./sqlmap.py -u ***
--batch --privileges --forms --technique=U -pXX --dump -T ** -D
Technique: UNION
Back-end DBMS: MySQL (fingerprinted)
Traceback
Hi m4l1c3.
Thank you for your report and find it fixed and committed in the last
revision (r4542).
Kind regards
On Wed, Nov 23, 2011 at 2:36 AM, m4l1c3 wrote:
> sqlmap version: 1.0-dev (r4541)
> Python version: 2.6.5
> Operating system: posix
> Command line: ./sqlmap.py -u
sqlmap version: 1.0-dev (r4541)
Python version: 2.6.5
Operating system: posix
Command line: ./sqlmap.py -u ** --batch --dbs
--forms --crawl 3 --smart --technique=U
Technique: None
Back-end DBMS: None (identified)
Traceback (most recent call last):
File "/pentest/database/s
Webscarab can save output for.
Also, you can try ZAP from OWASP.
On Nov 21, 2011, at 11:00 PM, Bob Simonoff wrote:
>
> Miroslav, thanks, that is exactly the problem. Unfortunately, when I
> download the latest version, svn exits on me when my virus checker complains
> about one of the exe