Skip to content

Support for SQL injection #424

@alanbak

Description

@alanbak

Hello, all.

I'm trying to exploit the blind injection in the following query:

?id=1"or(ExtractValue(1,concat(0x3a,(version()))))="1

sqlmap not find vulnerabilities, can not be used.

But my request in browser url:

?id=1"or(ExtractValue(1,concat(0x3a,(version()))))="1

It takes a successful ... How can I get sqlmap use my method of attack from the one it uses by default.

Sincerely, Alan

p.s. sorry for my bad english

Metadata

Metadata

Assignees

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions