Closed AVR1234 closed 7 years ago
Either false positive (if you are getting garbage with --banner
too then rerun with --flush-session
) or the column is a binary dump of (e.g.) password hashes. In that case rerun with --binary-fields
(https://github.com/sqlmapproject/sqlmap/wiki/Usage#binary-content-retrieval) and do the hash cracking with some other tool (e.g. hashcat
)
Hello, thanks for reply ./sqlmap.py -u "https://www.site.com/info.php?id=43" --technique="U" --random-agent -D main -T user -C payment_no --dump --binary-fields=payment_no --stop=5 I got it:
| 005535066549871AC28DD8046A4AA45577E08057F0A1C148A196913772810DC1 | | 007CCA975D72887C57F5990BA53116CA77E08057F0A1C148A196913772810DC1 | | 007F24E42DAE9FA4B95FB9294DA7F7CC77E08057F0A1C148A196913772810DC1 | | 00B5E9248D8164236703E904A3A64CB077E08057F0A1C148A196913772810DC1 |
Now i am learning hashcat)))
HELLO
I need help to upgrade my experience
What parameters should be set in sqlmap or where to look for the key and method to decode the value in the column like \ x01 / 5ë \ x01 \ x9d \ x00 \ x931 \ x9bç \ x11 \ x88l \ x8fÂwà \ x80Wð¡ÁH¡ \ x96 \ x917r
Or tell me where you can read about it, and then I can not find, I'm all told that you need to know the engine of the site, but if the site is self-written, how to do it?