sqlmap翻译

heuristics detected web page charset
启发式检测到的网页字符集

it is not recommended to continue in this kind of cases. Do you want to quit and make sure that everything is set up properly
在这种情况下, 不建议继续。您是否要退出并确保所有内容都设置正确

HTTP error codes detected during run
运行过程中检测到的 http 错误代码

使用sqlmap
cd到C:\Python27\sqlmapproject-sqlmap-9f75fd4
渗透测试的时候最好加上python

legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
法律免责声明:未经双方同意,使用sqlmap攻击目标是非法的。最终用户有责任遵守所有适用的地方、州和联邦法律。开发人员不承担任何责任,也不对本程序造成的任何滥用或损害负责

all tested parameters do not appear to be injectable
所有测试过的参数似乎都不是可注入的

perform more tests
执行更多的测试

If you suspect that there is some kind of protection mechanism involved (e.g. WAF) maybe you could try to use option '--tamper' (e.g. '--tamper=space2comment') and/or switch '--random-agent'
如果你怀疑涉及某种保护机制(例如waf),你可以尝试使用选项'--tamper'(例如 --tamper=space2comment)或者使用选项
--random-agent

as this case looks like a perfect candidate
由于这种情况看起来是一个完美的候选

stable
稳定的
dynamic
静态的

heuristic (basic) test shows that GET parameter 'id' might not be injectable
启发式(基本)测试表明获得参数“ID”可能是不可注入的

HTTP error codes detected during run 
运行时检测到http错误代码




你可能感兴趣的:(sqlmap)