0

I was working on a target where sqlmap detected boolean based time blind injection. Everything was working perfect but you know it was time blind injection so I knew that this is going to take forever to dump database. So I pressed ctrl+c and stopped the current injection which was running for almost 7-8 hours and also dumped lots of information from database. But since the attack was not finished, .csv file was still not created and I had all the dumped result only in cmd window.

Now after stopping the attack I started the attack again and accidently used --flush-session --batch flags and started the attack again. This time my sqlmap failed to even retrieve database type (mysql) and whole attack was failed. sqlmap returned error and said target is not vulnerable.

Now I am trying old command, even the payload and everything where I already had successful attack and was dumping database but nothing is working now. I even tried removing log & session.sqlite file from sqlmap directory so I can start a fresh attack on target but still sqlmap is not able to get success. I know that parameter and target is still vulnerable but sqlmap is not getting it. I have saved whole cmd window history in a txt file so I have half dumped data but it is not in table format so maybe need to sort it out in columns and rows but don't know how. What can I do in this situation?

2
  • Maybe there is a cookie or bearer token in the request you're using that has now expired?
    – paj28
    CommentedMay 14, 2024 at 8:00
  • @paj28 No. I used --flush-session which permanently delete the session according to sqlmap github. And now new attack is not working and even if it works, I still have to retrieve everything I already have one by one to continue where I left my attack!!!
    – Solo
    CommentedMay 14, 2024 at 11:18

0

You must log in to answer this question.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.