Skip to content

bug!? #3510

@687766616e

Description

@687766616e

python2 sqlmap.py -u "http://www.test.com/test/" --form -v 2 -o --level 5 --sqlmap-shell --random-agent --drop-set-cookie --tamper randomcase,varnish,xforwardedfor
--dbs -p DropDownList1,filenamename,filefind

[#1] form:
POST http://www.test.com/test/index.aspx
POST data: __EVENTTARGET=&__EVENTARGUMENT=&__LASTFOCUS=&__VIEWSTATE=%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%2BICAgICAgICAgICDnrKwzOOWNtyDnrKwx5pyfZGQCDw88KwALAQAPFggfABYAHwECAR8CAgEfAwIBZBYCZg9kFgICAQ9kFgJmD2QWAmYPDxYCHwQFYzxpbWcgaGVpZ2h0PTEzMSB3aWR0aD05OSBzcmM9L3Njc2x6ei9mbS9jaC5leGUgYm9yZGVyPTAgYWxpZ249YWJzbWlkZGxlPiAgICAgICAgICAg56ysMzjljbcg56ysMeacn2RkZNag4RAfFUObYPUY4cE%2FHVPTL9uJ&DropDownList1=%202019&filenamename=&filefind=%E6%90%9C%E7%B4%A2&__EVENTVALIDATION=%2FwEWLALKkunqCgKd5I%2FlCgLq64OnCALl64OnCALg64OnCALj64OnCALm64OnCALh64OnCAKc9IOnCAKf9IOnCALi64OnCAKd9IOnCALq66%2F4AQLl66%2F4AQLg66%2F4AQLj66%2F4AQLm66%2F4AQLh66%2F4AQKc9K%2F4AQKf9K%2F4AQLi66%2F4AQKd9K%2F4AQKny9DiCwKmy9DiCwLdy9DiCwLcy9DiCwKjy9DiCwKiy9DiCwLZy9DiCwLYy9DiCwLfy9DiCwLey9DiCwKny%2FyHAwKmy%2FyHAwLdy%2FyHAwLcy%2FyHAwKjy%2FyHAwKiy%2FyHAwLZy%2FyHAwLYy%2FyHAwKAg4OnDwKMv6uJBgLc%2BYTHAQK55oe9D8haCp1g4KEYnDTdakge8FjZ1N9T
[CRITICAL] heuristics detected that the target is protected by some kind of WAF/IPS
do you want sqlmap to try to detect backend WAF/IPS? [y/N] y
[01:19:18] [INFO] using WAF scripts to detect backend WAF/IPS protection
[01:19:18] [DEBUG] checking for WAF/IPS product '360 Web Application Firewall (360)'

here~
redirect is a result of a POST request. Do you want to resend original POST data to a new location? [y/N] y
here~

[01:19:40] [DEBUG] checking for WAF/IPS product 'aeSecure (aeSecure)'
[01:19:40] [DEBUG] checking for WAF/IPS product 'Airlock (Phion/Ergon)'
[01:19:40] [DEBUG] checking for WAF/IPS product 'Anquanbao Web Application Firewall (Anquanbao)'
[01:19:41] [DEBUG] checking for WAF/IPS product 'PerimeterX (PerimeterX, Inc.)'
[01:19:41] [DEBUG] checking for WAF/IPS product 'Generic (Unknown)'
[01:19:41] [WARNING] WAF/IPS product hasn't been identified

it's normal? or?...

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions