Skip to content

A really simple script for boolean-blind SQLi exploitation of vulnerable GET parameters

Notifications You must be signed in to change notification settings

cheshireca7/blindsqli

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 

Repository files navigation

DISCLAIMER: I AM NOT RESPONSIBLE OF THE MISUSE OF THIS TOOL. YOU RUN IT AT YOUR OWN RISK. Before running it, make sure you are in a controlled environment, and where you are allowed to perform this kind of exercise. PLEASE BE KIND :)

blindsqli

A really simple script for boolean-blind SQLi exploitation of vulnerable GET parameters

alt text

Usage

Syntax: ./blindsqli.sh 'http[s]://<URL>?<vulnparam>=<paramvalue>' '<SQL query>' '<String which appears when TRUE condition>'

Notice that the vulnerable GET parameter should be at the end of the URL. In the example below, id is the vulnerable GET paramenter.

Example: ./blindsqli.sh 'http://vulnerable.site/sqli.php?Submit=Submit&id=1234' 'SELECT concat(username,":",password) FROM awd.accounts LIMIT 1,1' 'JohnDoe'"

TODOs

  • Target POST parameters.
  • Optimization.

About

A really simple script for boolean-blind SQLi exploitation of vulnerable GET parameters

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages