only time-based SQLi worked

KxCode's Avatar

KxCode

05 Jan, 2016 02:03 PM

I use Arachni to scan WebPentestLab's vulnerable website.
And i find that Arachni only can find the SQLi vulns by timing attack, and this will take a long time.
while sqlmap will detect the SQLi vulns quickly with all techs, such as boolean-based, union-based .

arachni cant find a SQLi by bolean-based algorithm ,like:
?id=xx' and '1'='1

  1. Support Staff 1 Posted by Tasos Laskos on 05 Jan, 2016 02:05 PM

    Tasos Laskos's Avatar

    Can you try the nighlies please?
    They've had some improvements in this area.

    Cheers

  2. 2 Posted by KxCode on 05 Jan, 2016 02:18 PM

    KxCode's Avatar

    I'll have a try. thks
    I decide to concern on this project . Cheers, followed you on twitter : P

  3. 3 Posted by KxCode on 05 Jan, 2016 04:00 PM

    KxCode's Avatar

    i tried the nighlies version. but the problem still exists.
    only the time-based payload works fine in Arachni.

    you can try with the SQLi example 1 in this https://pentesterlab.com/exercises/web_for_pentester

  4. Support Staff 4 Posted by Tasos Laskos on 06 Jan, 2016 01:28 PM

    Tasos Laskos's Avatar

    I just got a positive result for the name input from the differential analysis check:

    ./bin/arachni http://192.168.1.55/sqli/example1.php?name=root --checks=sql_injection_differential --scope-page-limit=1
    

    Can you not reproduce this with the nightlies?

  5. 5 Posted by KxCode on 19 Jan, 2016 07:06 AM

    KxCode's Avatar

    nighlies works

  6. Tasos Laskos closed this discussion on 19 Jan, 2016 10:23 AM.

Comments are currently closed for this discussion. You can start a new one.

Keyboard shortcuts

Generic

? Show this help
ESC Blurs the current field

Comment Form

r Focus the comment reply box
^ + ↩ Submit the comment

You can use Command ⌘ instead of Control ^ on Mac