1
resposta

SQLMAP não retorna o resultado esperado

Olá, primeiro gostaria de dizer que não consegui utilizar as versões te Kali + VirtualBox fornecidas aqui, mesmo tentando aplicar todas as gambiarras que encontrei na internet, estou conseguindo usar normalmente com as ultimas versões de ambos, Kali 2021 e VirtualBox 6.1.

O SQLMAP não funciona de acordo com o apresentado na aula, a versão da aula é 1.0.9 e atualmente, no Kali 2021, o SQLMAP está na versão 1.5.2, acredito que muita coisa foi modificada nesse programa e o que está sendo ensinado na aula não se aplica para o software atual.

OBS: A maquina virtual do servidor está na mesma versão fornecida no curso, não precisei modificar ou atualizar nada nela.

Existe alguma alternativa ou modo de usar diferente para obter os mesmos resultados da aula?

Output do SQLMAP para o comando --current-db:

└─$ sqlmap -u "http://192.168.1.25/mutillidae/index.php?page-user-info.php&username=admin&password=&user-info-php-submit-button=View+Account+Details" --current-db
        ___
       __H__
 ___ ___[']_____ ___ ___  {1.5.2#stable}
|_ -| . [']     | .'| . |
|___|_  [)]_|_|_|__,|  _|
      |_|V...       |_|   http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting @ 08:52:21 /2021-06-02/

[08:52:22] [WARNING] provided value for parameter 'password' is empty. Please, always use only valid parameter values so sqlmap could be able to run properly
[08:52:22] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own ('PHPSESSID=qsckdate2ro...6j6f4ivvs0;showhints=1'). Do you want to use those [Y/n] y
[08:52:30] [INFO] checking if the target is protected by some kind of WAF/IPS
[08:52:35] [INFO] testing if the target URL content is stable
[08:52:39] [INFO] target URL content is stable
[08:52:39] [INFO] testing if GET parameter 'username' is dynamic
[08:52:43] [WARNING] GET parameter 'username' does not appear to be dynamic
[08:52:48] [WARNING] heuristic (basic) test shows that GET parameter 'username' might not be injectable
[08:52:49] [INFO] testing for SQL injection on GET parameter 'username'
[08:52:49] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[08:53:09] [INFO] testing 'Boolean-based blind - Parameter replace (original value)'
[08:53:13] [INFO] testing 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)'
[08:53:29] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
[08:53:45] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause (IN)'
[08:54:01] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
[08:54:17] [INFO] testing 'Generic inline queries'
[08:54:20] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)'
[08:54:20] [CRITICAL] considerable lagging has been detected in connection response(s). Please use as high value for option '--time-sec' as possible (e.g. 10 or more)
[08:54:33] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)'
[08:54:46] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)'
[08:54:59] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[08:55:16] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
[08:55:32] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind (IF)'
[08:55:49] [INFO] testing 'Oracle AND time-based blind'
Y
[08:59:10] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
[08:59:10] [CRITICAL] unable to connect to the target URL. sqlmap is going to retry the request(s)
[08:59:10] [WARNING] most likely web server instance hasn't recovered yet from previous timed based payload. If the problem persists please wait for a few minutes and rerun without flag 'T' in option '--technique' (e.g. '--flush-session --technique=BEUS') or try to lower the value of option '--time-sec' (e.g. '--time-sec=2')
[08:59:42] [WARNING] GET parameter 'username' does not seem to be injectable
[08:59:42] [INFO] testing if GET parameter 'password' is dynamic
[08:59:45] [WARNING] GET parameter 'password' does not appear to be dynamic
[08:59:49] [WARNING] heuristic (basic) test shows that GET parameter 'password' might not be injectable
[08:59:49] [INFO] testing for SQL injection on GET parameter 'password'
[08:59:49] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[09:00:06] [INFO] testing 'Boolean-based blind - Parameter replace (original value)'
[09:00:10] [INFO] testing 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)'
[09:00:26] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
1 resposta
[09:00:26] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
[09:00:42] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause (IN)'
[09:00:57] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
[09:01:13] [INFO] testing 'Generic inline queries'
[09:01:16] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)'
[09:01:29] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)'
[09:01:42] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)'
[09:01:55] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[09:02:11] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
[09:02:28] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind (IF)'
[09:02:43] [INFO] testing 'Oracle AND time-based blind'
[09:02:59] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
[09:03:31] [WARNING] GET parameter 'password' does not seem to be injectable
[09:03:31] [INFO] testing if GET parameter 'user-info-php-submit-button' is dynamic
[09:03:34] [WARNING] GET parameter 'user-info-php-submit-button' does not appear to be dynamic
[09:03:38] [WARNING] heuristic (basic) test shows that GET parameter 'user-info-php-submit-button' might not be injectable
[09:03:38] [INFO] testing for SQL injection on GET parameter 'user-info-php-submit-button'
[09:03:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[09:03:55] [INFO] testing 'Boolean-based blind - Parameter replace (original value)'
[09:03:59] [INFO] testing 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)'
[09:04:15] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
[09:04:31] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause (IN)'
[09:04:47] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
[09:05:03] [INFO] testing 'Generic inline queries'
[09:05:06] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)'
[09:05:19] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)'
[09:05:32] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)'
[09:05:44] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[09:06:00] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
[09:06:17] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind (IF)'
[09:06:32] [INFO] testing 'Oracle AND time-based blind'
[09:06:48] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
[09:07:19] [WARNING] GET parameter 'user-info-php-submit-button' does not seem to be injectable
[09:07:19] [CRITICAL] all tested parameters do not appear to be injectable. Try to increase values for '--level'/'--risk' options if you wish to perform more tests. If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could try to use option '--tamper' (e.g. '--tamper=space2comment') and/or switch '--random-agent'

[*] ending @ 09:07:19 /2021-06-02/