• caglararli@hotmail.com
  • 05386281520

Accidently used –flush-session –batch in sqlmap tool. Need help!

Çağlar Arlı      -    19 Views

Accidently used –flush-session –batch in sqlmap tool. Need help!

I was working on a target where sqlmap detected boolean based time blind injection. Everything was working perfect but you know it was time blind injection so I knew that this is going to take forever to dump database. So I pressed ctrl+c and stopped the current injection which was running for almost 7-8 hours and also dumped lots of information from database. But since the attack was not finished, .csv file was still not created and I had all the dumped result only in cmd window.

Now after stopping the attack I started the attack again and accidently used --flush-session --batch flags and started the attack again. This time my sqlmap failed to even retrieve database type (mysql) and whole attack was failed. sqlmap returned error and said target is not vulnerable.

Now I am trying old command, even the payload and everything where I already had successful attack and was dumping database but nothing is working now. I even tried removing log & session.sqlite file from sqlmap directory so I can start a fresh attack on target but still sqlmap is not able to get success. I know that parameter and target is still vulnerable but sqlmap is not getting it. I have saved whole cmd window history in a txt file so I have half dumped data but it is not in table format so maybe need to sort it out in columns and rows but don't know how. What can I do in this situation?