Exploiting Second Order SQLi Flaws by using Burp & Custom Sqlmap Tamper – Pentest Blog
Common Information
Type Value
UUID ba5e34c6-7b87-4fbe-8854-1bfff64d83ac
Fingerprint 934eabcacfb6043d
Analysis status DONE
Considered CTI value 0
Text language
Published Aug. 1, 2017, 12:24 p.m.
Added to db Jan. 18, 2023, 10:07 p.m.
Last updated Nov. 18, 2024, 3:30 p.m.
Headline Exploiting Second Order SQLi Flaws by using Burp & Custom Sqlmap Tamper
Title Exploiting Second Order SQLi Flaws by using Burp & Custom Sqlmap Tamper – Pentest Blog
Detected Hints/Tags/Attributes 38/1/13
Attributes
Details Type #Events CTI Value
Details Domain 29
sqlmap.py
Details Domain 4134
github.com
Details Domain 17
sqlmap.org
Details Domain 1
durian.py
Details File 29
sqlmap.py
Details File 4
r.txt
Details File 42
information_schema.tab
Details File 5
lib.core
Details File 1
durian.py
Details Github username 2
h3xstream
Details IPv4 1442
127.0.0.1
Details Url 2
https://github.com/h3xstream/http-script-generator
Details Url 11
http://sqlmap.org