Hey,
I am currently on cast #5 on the sqlmap essentials room, I found the ejection and most of the flag, but can’t get the full flag. The hint says to run the command few times to get the correct result, but no mather how many times I ran it and changed commands, it didnt help.
Getting the answer is easier than you think:
1.Intercept the request with burpsuite
2. Execute sqlmap -r case5.txt --no-cast -T flag5 --batch --dump
In this case, neither --risk nor --level is necessary.
I would like to share my experience, hopefully it will help those who struggle like me. I ran it 2 days on my laptop, and it never work. I switch to Hack The Box Academy Parrot Attack Box, and it work at first tried.
this pretty much explains it. using the pwnbox would have the least latency. you just have to repeat doing the right commands and removing the saved output so it doesnt continue from previous sessions.
Man this question drove me insane. Turns out increasing the seconds to delay DBMS response needs to be increased to 10secs because the box is so laggy! Here is the cmd that worked for me hope it helps the rest of you guys who probably have the correct answer just minus the secs delay parameter.
Also restarting the box is advisable and increase the “time-sec” param if the system says your flag is incorrect as the format it returns is sometimes garbled. Too me like 1 hour for it to decode correctly.
In that second command the threads are set to 10 so its much more faster to retrieve and finish the time-based injection. Faster retrieval in time-based means lesser error on the retrieved data.
You can run the second query as many times as you like until you retrieve the whole correct data.