- 5 Haz 2016
- 4
- 0
Arkadaş
[23:32:20] [WARNING] using unescaped version of the test because of zero knowled
ge of the back-end DBMS. You can try to explicitly set it with option '--dbms'
[23:32:29] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
[23:32:36] [WARNING] GET parameter 'id' is not injectable
[23:32:36] [CRITICAL] all tested parameters appear to be not injectable. Try to
increase '--level'/'--risk' values to perform more tests. Also, you can try to r
erun by providing either a valid value for option '--string' (or '--regexp'). If
you suspect that there is some kind of protection mechanism involved (e.g. WAF)
maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment')
böyle bir hata alıyorum lütfen yardım edin
[23:32:20] [WARNING] using unescaped version of the test because of zero knowled
ge of the back-end DBMS. You can try to explicitly set it with option '--dbms'
[23:32:29] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
[23:32:36] [WARNING] GET parameter 'id' is not injectable
[23:32:36] [CRITICAL] all tested parameters appear to be not injectable. Try to
increase '--level'/'--risk' values to perform more tests. Also, you can try to r
erun by providing either a valid value for option '--string' (or '--regexp'). If
you suspect that there is some kind of protection mechanism involved (e.g. WAF)
maybe you could retry with an option '--tamper' (e.g. '--tamper=space2comment')
böyle bir hata alıyorum lütfen yardım edin
Son düzenleme: