Sqlmapdan acik siteyi tarattim ama kirmizi renkle en son boyle yaziyor.
python sqlmap.py -u "https://www.ambrosia-servers.com/amxbans/ban_list.php?site=-1" --dbs
[CRITICAL] all tested parameters appear to be not injectable. Try to increase '--level'/' --risk values to perform more tests. You can give it a go with the switch '--text--only' if the target page has a low percentage of textual contect <~3.73% of page content is text>. As heuristic test turned out positive you are strongly advise to continue on with the tests. Please, consider usage of tampering scripts as your target might filter the queries. Also, you can try to rerun by providing either a valid value for option '--string' <or '--regexp'>. If you suspect that there is some kind of protection mechanism involved <e.g. WAF> maybe you could retry with an option '--tamper' <e.g. '--tamper=space2comment'>
python sqlmap.py -u "https://www.ambrosia-servers.com/amxbans/ban_list.php?site=-1" --dbs
[CRITICAL] all tested parameters appear to be not injectable. Try to increase '--level'/' --risk values to perform more tests. You can give it a go with the switch '--text--only' if the target page has a low percentage of textual contect <~3.73% of page content is text>. As heuristic test turned out positive you are strongly advise to continue on with the tests. Please, consider usage of tampering scripts as your target might filter the queries. Also, you can try to rerun by providing either a valid value for option '--string' <or '--regexp'>. If you suspect that there is some kind of protection mechanism involved <e.g. WAF> maybe you could retry with an option '--tamper' <e.g. '--tamper=space2comment'>