You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
custom injection marker ('*') found in option '-u'. Do you want to process it? [Y/n/q] Y
[14:14:38] [INFO] flushing session file
[14:14:38] [INFO] testing connection to the target URL
[14:14:38] [INFO] checking if the target is protected by some kind of WAF/IPS
[14:14:38] [INFO] testing if the target URL content is stable
[14:14:38] [INFO] target URL content is stable
other non-custom parameters found. Do you want to process them too? [Y/n/q] N
[14:14:38] [INFO] skipping URI parameter '#1*'
[14:14:38] [CRITICAL] all tested parameters do not appear to be injectable. Try to increase values for '--level'/'--risk' options if you wish to perform more tests. If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could try to use option '--tamper' (e.g. '--tamper=space2comment') and/or switch '--random-agent'
[*] ending @ 14:14:38 /2023-10-30/
Skipping the PATH params without checking it.
The text was updated successfully, but these errors were encountered:
SQLMap version 1.7.10
SQLmap just returns:
Skipping the PATH params without checking it.
The text was updated successfully, but these errors were encountered: