LogoScannerVersionBuildVendor
sqlmap1.0Jul 5,2012sqlmap developers

Tested Against WAVSEP Version:
1.2

The SQL Injection Detection Accuracy of the Scanner:
Detection AccuracyChart
100.00% Detection Rate
0.00% False Positives
(136/136)
(0/10)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected: 1(1st&2nd)-19
Errorneous 500 ResponsesHTTP POST (Body Parameters)20 out of 20Detected: 1(1st&2nd)-19
Errorneous 200 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected: 1(1st&2nd)-19
Errorneous 200 ResponsesHTTP POST (Body Parameters)20 out of 20Detected: 1(1st&2nd)-19
Valid 200 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected: 1(1st&2nd)-19 (case 4 requires level = 4)
Valid 200 ResponsesHTTP POST (Body Parameters)20 out of 20Detected: 1(1st&2nd)-19
Identical 200 ResponsesHTTP GET (Query String Parameters)8 out of 8Detected: 1-8
Identical 200 ResponsesHTTP POST (Body Parameters)8 out of 8Detected: 1-8
False Positive SQLi Test CasesHTTP GET (Query String Parameters)0 out of 10None

WAVSEP Scan Log:
In my experience, the best way to make sqlmap behave like a scanner is to optimize it, so I did not enable any exploitation features in the configuration file, and in addition, crawled the application?s SQL vulnerable pages and false positive pages through burp, while creating a separate burp-formatted log file for each individual directory (and making sure to include only the relevant requests in each log file). I supplied the burp-generated log files to sqlmap as the target source, and used sqlmap?s config file to configure the following scan variables (in sqlmap.conf):
Changes made to the configuration file of sqlmap (sqlmap.conf):
logFile (list in the stable version) = BurpLogs\Burp-WAVSEP-[log-name].log
Level of tests to perform (level = 4) (sometimes 2)
Risk of tests to perform (risk = 3)
SQL injection techniques to test for (tech=BEST) (the default is BEUST)
dbms = mysql 5, os = windows, getBanner = False, extensiveFp = True, batch = True, flushSession = True, forms = False (Parse and test forms on target url), freshQueries = True (Ignores query results stored in session file), extensiveFp = False
The scans were executed against each individual directory, using the following command:
python sqlmap.py -c sqlmap.conf
The tool scanned all the URLs, performed initial tests on all GET/POST/cookie/user-agent values, and detected all the vulnerable test cases (!), with zero false positives. In most cases, all the vulnerable pages were located in the initial scan, while in rare cases it required a secondary scan (either identical or with level = 2 or 4) to locate all the test cases (probably load issues on the tested station).


Copyright © 2010-2016 by Shay Chen. All rights reserved.
Click here to learn how this information may be published or reused.