On Monday, February 18, 2013, Bernardo Damele A. G. wrote:
>
> --technique T to force only time-based SQL injection. Refer to the
> user's manual for further details on --technique switch.
>
>
Apologies. It is technique not type :)
--
Regards
L.
Sent using electronic mail ツ
On Monday, February 18, 2013, Bruno Garcia wrote:
> Hello,
>
> I have this injection:
>
> Place: POST
> Parameter: x
> Type: boolean-based blind
> Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY
> clause (RLIKE)
> Payload: xxx=&=test' RLIKE IF(8894=88
On Fri, Dec 7, 2012 at 8:49 AM, Leon Jacobs wrote:
> Hi,
>
> I am getting this exception when trying to read files from disk. It is
> postgres backend. The exception occurs right after:
>
Apologies, sent too fast.
Exception occurs right after:
[08:49:29] [INFO] creating UD
Hi,
I am getting this exception when trying to read files from disk. It is
postgres backend. The exception occurs right after:
sqlmap version: 1.0-dev-b5c8707
Python version: 2.7.2
Operating system: posix
Command line: ./sqlmap.py -u **
--file-read=/var/www/index.
n --hostname which is not an IP address that
> your require. Have to seek what can be used here.
Yeah this is perfect. And then hopefully getting the IP is as simple as
looking up the hostname, assuming it resolves but that is not guaranteed.
=p
--
Regards
Leon Jacobs
(or I am the one who didn't know it?)
>
> Thanks,
>
If its MySQL and according to [1], try:
$ python sqlmap.py -u something --sql-query="show variables where
Variable_name = 'hostname'"
I am not 100% sure about the required permissions/escaping that might b