Darknet04 / jsql-injection

Automatically exported from code.google.com/p/jsql-injection
0 stars 0 forks source link

Query Blind SQL very slow #4

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago

What is the expected output? What do you see instead?
*** Read error Server returned HTTP response code: 406

What version of the product are you using? On what operating system?
0.4 on windows 8 pro x64

Please provide any additional information below.
jsql injection showed name of Current db, but cant show or guess table name;

Original issue reported on code.google.com by hoang9...@gmail.com on 28 May 2013 at 9:24

Attachments:

GoogleCodeExporter commented 8 years ago
If I understand correctly response error 406 Not Acceptable, it means the 
server can't respond to the request headers, in other words "the browser wants 
something that can't be provided by the server". It may be an error forced by a 
security check or a firewall on the server.

Attach more information on these requests if possible (see tab Header for 
complete request+head), it may give some extra needed information ; you could 
add a pastebin, a google dork, an anonymized log, or send a mail.
Also have you manually verified that Blinde exploit works, without jSQL? In 
that case could you provide your parameter value and the SQL statement, I'll 
make a comparison with jSQL.

Original comment by ron190@ymail.com on 30 May 2013 at 7:15