I have a multipart form data where I am suspecting one of the multipart form fields (parameter named htmlbevt_id), to be vulnerable to SQLi. To test for the same I captured the request using Burp and saved it in a file, say myFile. Now on SQLMap I ran the following command:
sqlmap -r /root/Desktop/myFile -p htmlbevt_id
I get the following error message:
unable to connect to the target URL or proxy. sqlmap is going to retry the request
Am I missing something?
Am I required to login to the application before I run the above query? If so, how do I make SQL recognize the login? I mean is it that I need to login to the application from the browser and then run the above query (in which case I am not certain how exactly would SQLMap get to know that I am already logged into the application), or is there a different way to do this ?
I found a part of my answer through some research:
So basically i needed to tweak my sqlmap query to also include --cookie "all the semicolon separated cookies here". But even this does not seem to work in my case. I still get the same error message as above. I realized that the URL request I was making through myFIle was actually a POST request. So through some further googling I learned that I also needed to include --method=POST. However, the SQLmap that comes bundled with Kali is a new version and hence --method has beed deprecated in this version of SQLmap. Moreover I am not really sure that this would even solve the problem (the error).
Need help understanding where am I going wrong and what needs to be done.
Thanks in advance.
--
_______________________________________________________________________________
null - Spreading the right Information
null Mailing list charter: http://null.co.in/section/about/null_list_charter/
---
You received this message because you are subscribed to the Google Groups "null" group.
To unsubscribe from this group and stop receiving emails from it, send an email to null-co-in+...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Use the existing -r and append a * agaijst the parameter name you are trying to attack. Wjenever sqlmap identifies a * it starts attacking there