So, after trying out a username/password combo, if the response doesnât contain the word âincorrectâ, then hydra considers that username/password combo to be correct.
It is possible that the âLogin Failedâ page doesnât contain the âFail Stringâ which youâve provided and hydra eventually thinks that authentication was successful for all combinations.
To Fix,
Check if the login failed page has this keyword
Add the -f flag so that hydra will terminate on the first successful attempt.
When I want to login in PhpMyAdmin then it show me:
#1045 - Access denied for user 'root'@'localhost' (using password: YES)
Server have below open ports:
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-06 15:06 EDT
Nmap scan report for 192.168.56.5
Host is up (0.00065s latency).
Not shown: 990 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
80/tcp open http
110/tcp open pop3
111/tcp open rpcbind
139/tcp open netbios-ssn
143/tcp open imap
445/tcp open microsoft-ds
901/tcp open samba-swat
3306/tcp open mysql
I tried connect to MySQL via CLI:
# mysql -u root -p ROOT -h 192.168.56.5 -P 3306
Enter password:
ERROR 1045 (28000): Access denied for user 'root'@'192.168.56.6' (using password: YES)
$ sudo sqlmap -u 192.168.56.5 --batch --dbs --crawl=2
do you want to check for the existence of site's sitemap(.xml) [y/N] N
[09:49:51] [INFO] starting crawler for target URL 'http://192.168.56.5'
[09:49:51] [INFO] searching for links with depth 1
[09:49:51] [INFO] searching for links with depth 2
please enter number of threads? [Enter for 1 (current)] 1
[09:49:51] [WARNING] running in a single-thread mode. This could take a while
[09:50:21] [CRITICAL] connection timed out to the target URL. sqlmap is going to retry the request(s)
[09:50:21] [WARNING] if the problem persists please check that the provided target URL is reachable. In case that it is, you can try to rerun with switch '--random-agent' and/or proxy switches ('--ignore-proxy', '--proxy',...)
[09:51:51] [CRITICAL] connection timed out to the target URL
do you want to normalize crawling results [Y/n] Y
do you want to store crawling results to a temporary file for eventual further processing with other tools [y/N] N
[09:51:51] [INFO] found a total of 2 targets
URL 1:
GET http://192.168.56.5?page=about
do you want to test this URL? [Y/n/q]
> Y
[09:51:51] [INFO] testing URL 'http://192.168.56.5?page=about'
[09:51:51] [INFO] using '/root/.sqlmap/output/results-10092020_0951am.csv' as the CSV results file in multiple targets mode
[09:51:51] [INFO] testing connection to the target URL
[09:51:51] [INFO] testing if the target URL content is stable
[09:51:52] [INFO] target URL content is stable
[09:51:52] [INFO] testing if GET parameter 'page' is dynamic
[09:51:52] [INFO] GET parameter 'page' appears to be dynamic
[09:51:52] [WARNING] heuristic (basic) test shows that GET parameter 'page' might not be injectable
[09:51:52] [INFO] heuristic (FI) test shows that GET parameter 'page' might be vulnerable to file inclusion (FI) attacks
[09:51:52] [INFO] testing for SQL injection on GET parameter 'page'
[09:51:52] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[09:51:52] [WARNING] reflective value(s) found and filtering out
[09:51:52] [INFO] testing 'Boolean-based blind - Parameter replace (original value)'
[09:51:52] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[09:51:52] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
[09:51:52] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause (IN)'
[09:51:52] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
[09:51:52] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace (FLOOR)'
[09:51:52] [INFO] testing 'Generic inline queries'
[09:51:52] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)'
[09:51:52] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)'
[09:51:52] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)'
[09:51:52] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[09:51:53] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
[09:51:53] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind (IF)'
[09:51:53] [INFO] testing 'Oracle AND time-based blind'
it is recommended to perform only basic UNION tests if there is not at least one other (potential) technique found. Do you want to reduce the number of requests? [Y/n] Y
[09:51:53] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
[09:51:53] [WARNING] GET parameter 'page' does not seem to be injectable
[09:51:53] [ERROR] all tested parameters do not appear to be injectable. Try to increase values for '--level'/'--risk' options if you wish to perform more tests. If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could try to use option '--tamper' (e.g. '--tamper=space2comment') and/or switch '--random-agent', skipping to the next URL
URL 2:
GET http://192.168.56.5/index.php?page=about
do you want to test this URL? [Y/n/q]
> Y
[09:51:53] [INFO] testing URL 'http://192.168.56.5/index.php?page=about'
[09:51:53] [INFO] testing connection to the target URL
[09:51:53] [INFO] checking if the target is protected by some kind of WAF/IPS
[09:51:53] [INFO] testing if the target URL content is stable
[09:51:53] [INFO] target URL content is stable
[09:51:53] [INFO] testing if GET parameter 'page' is dynamic
[09:51:53] [INFO] GET parameter 'page' appears to be dynamic
[09:51:53] [WARNING] heuristic (basic) test shows that GET parameter 'page' might not be injectable
[09:51:53] [INFO] heuristic (FI) test shows that GET parameter 'page' might be vulnerable to file inclusion (FI) attacks
[09:51:53] [INFO] testing for SQL injection on GET parameter 'page'
[09:51:53] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[09:51:53] [WARNING] reflective value(s) found and filtering out
[09:51:53] [INFO] testing 'Boolean-based blind - Parameter replace (original value)'
[09:51:53] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)'
[09:51:53] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
[09:51:54] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause (IN)'
[09:51:54] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
[09:51:54] [INFO] testing 'MySQL >= 5.0 error-based - Parameter replace (FLOOR)'
[09:51:54] [INFO] testing 'Generic inline queries'
[09:51:54] [INFO] testing 'PostgreSQL > 8.1 stacked queries (comment)'
[09:51:54] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries (comment)'
[09:51:54] [INFO] testing 'Oracle stacked queries (DBMS_PIPE.RECEIVE_MESSAGE - comment)'
[09:51:54] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (query SLEEP)'
[09:51:54] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
[09:51:54] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind (IF)'
[09:51:54] [INFO] testing 'Oracle AND time-based blind'
it is recommended to perform only basic UNION tests if there is not at least one other (potential) technique found. Do you want to reduce the number of requests? [Y/n] Y
[09:51:54] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
[09:51:54] [WARNING] GET parameter 'page' does not seem to be injectable
[09:51:54] [ERROR] all tested parameters do not appear to be injectable. Try to increase values for '--level'/'--risk' options if you wish to perform more tests. If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could try to use option '--tamper' (e.g. '--tamper=space2comment') and/or switch '--random-agent', skipping to the next URL
[09:51:54] [INFO] you can find results of scanning in multiple targets mode inside the CSV file '/root/.sqlmap/output/results-10092020_0951am.csv'
[*] ending @ 09:51:54 /2020-10-09/
Sorry for the very delayed response.
Doubt it but do you still need help with this?
If yeah then do you have any details of the site/server/remote that youâre targeting?
Like have you run any initial recon exercises on the host? Identifying the backend would be handy. Usually easy enough to do by just visiting the site on your browser with the wappalyzer extension installed and shodan wouldnât hurt either.
Knowing what youâre dealing with will go a much longer way in terms of time saving and knowing which attack vector to go with.
As a side note if youâre gonna use crawl with sqlmap you may as well be going at crawl=3 and itâs generally a good idea to always use the âârandom-agentâ flag. If you get blocked or dropped by any WAF (which you donât seem to be in this case but going to mention it anyway) you can try using tor. Just make sure you have the tor service running then add ââcheck-torâ & ââtorâ flags. Otherwise if you have proxies then use those.
This is the answer to your question above of âWhy it tell me that found the password but password not workingâ? My advice is to understand the tools you are using and stop asking questions that already have been answered.