Skip to content

SQLMap outputs

Log Messages Description

URL Content is stable:

  • target URL content is stable

Parameter appears to be Dynamic

  • GET parameter id appears to be dynamic

Parameter might be injectable

  • heuristic (basic) test shows that GET parameter 'id' might be injectable (possible DBMS: 'MySQL')

Parameter might be vulnerable to XSS attacks

  • heuristic (XSS) test shows that GET parameter 'id' might be vulnerable to cross-site scripting (XSS) attacks

Back-end DBMS is '...'

  • it looks like the back-end DBMS is 'MySQL'. Do you want to skip test payloads specific for other DBMSes? [Y/n]
    • this can allow us to narrow down the payloads to a specific dbms

Level/Risk values

  • for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n]
    • run deeper test when the dbms is identified.
    • run top level tests when dbms is not identified.

Reflective values found

  • reflective value(s) found and filtering ou
    • user input reflected in response. problematic for automated scanners but sqlmap filters it out.

Parameter appears to be injectable:

  • GET parameter 'id' appears to be 'AND boolean-based blind - WHERE or HAVING clause' injectable (with --string="luther")
    • id is injectable but could be an FP
    • with --string="luther" is used in the response for distinguishing TRUE from FALSE responses.

Time-based comparison statistical model

  • time-based comparison requires a larger statistical model, please wait........... (done)

Extending UNION query injection technique tests

  • automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found

Technique appears to be USEABLE

  • ORDER BY' technique appears to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test

Parameter is vulnerable:

  • GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N]

Sqlmap identified injection points

  • sqlmap identified the following injection point(s) with a total of 46 HTTP(s) requests:

Data logged to text files

  • fetched data logged to text files under '/home/user/.sqlmap/output/www.example.com'