12-12-2017 10:34 AM
I tried to exploit a vulnerability that was found with a program that find vulnerable but sqlmap says this message though it's vulnerable to be cause and how I can go over
[WARNING] The GET parameter 'query' does not seem to be injectable
[18:18:41] [CRITICAL] all tested parameters appear to be not injectable. Try to increase '-level' / '- risk' values to perform more tests. Also, you can try to rerun by providing either a valid value for option '--string' (or '--regexp'). If you suspect that there is some kind of protection mechanism involved (eg WAF), maybe you could try again with a '--tamper' option (eg '--tamper = space2comment')
Solved! Go to Solution.
12-14-2017 03:08 AM
i have used parameters from the documentation and vain the parameter is vulnerable as it is found with owasp zap but can not pass those waf protectors with code can use to be able to pass for filtering