aboutsummaryrefslogtreecommitdiff
path: root/tests/result/sql_injection.pcap.out
blob: e65a8850bcf434b8a1d2836ffb2bb55bdadf2582 (plain)
1
2
3
4
5
6
7
8
Guessed flow protos:	0

DPI Packets (TCP):	3	(3.00 pkts/flow)
Confidence DPI              : 1 (flows)

HTTP	5	2748	1

	1	TCP 192.168.3.109:53528 <-> 192.168.3.107:80 [proto: 7/HTTP][ClearText][Confidence: DPI][cat: Web/5][2 pkts/823 bytes <-> 3 pkts/1925 bytes][Goodput ratio: 84/90][0.00 sec][Hostname/SNI: 192.168.3.107][URL: 192.168.3.107/DVWA-master/vulnerabilities/sqli/?id=%3Fid%3Da%27+UNION+SELECT+%22text1%22%2C%22text2%22%3B--+-%26Submit%3DSubmit&Submit=Submit][StatusCode: 200][Content-Type: text/html][User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36][Risk: ** SQL Injection **** HTTP Numeric IP Address **][Risk Score: 260][Risk Info: No server to client traffic / Found host 192.168.3.107][PLAIN TEXT (GET /DV)][Plen Bins: 0,0,0,0,0,0,0,0,33,0,0,0,0,0,0,0,0,0,0,0,0,33,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,33,0,0]