# BlindSql exploit after sqli finds vuln plugins output console,textFile output config textFile set fileName output-w3af.txt set verbose True back output config console set verbose False back audit sqli back target set target http://localhost/w3af/audit/sql_injection/select/sql_injection_string.php?name=andres back start assert len(kb.kb.getData('sqli','sqli')) == 1 back exit