- Installation method (e.g.
pip,apt-get,git cloneorzip/tar.gz): - Client OS (e.g.
Microsoft Windows 10) - Program version (
python sqlmap.py --versionorsqlmap --versiondepending on installation): - Target DBMS (e.g.
Microsoft SQL Server): - Detected WAF/IDS/IPS protection (e.g.
ModSecurityorunknown): - SQLi techniques found by sqlmap (e.g.
error-basedandboolean-based blind): - Results of manual target assessment (e.g. found that the payload
query=test' AND 4113 IN ((SELECT 'foobar'))-- qKLVworks): - Relevant console output (if any):
- Exception traceback (if any):