-
-
Notifications
You must be signed in to change notification settings - Fork 6.1k
Closed
Labels
Description
Hello, all.
I'm trying to exploit the blind injection in the following query:
?id=1"or(ExtractValue(1,concat(0x3a,(version()))))="1
sqlmap not find vulnerabilities, can not be used.
But my request in browser url:
?id=1"or(ExtractValue(1,concat(0x3a,(version()))))="1
It takes a successful ... How can I get sqlmap use my method of attack from the one it uses by default.
Sincerely, Alan
p.s. sorry for my bad english