Skip to content

Luaioo/SQLi-Automation-Python-Tool

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

35 Commits
 
 
 
 

Repository files navigation

Blind SQLi Automation Tool (Python)

Vulnerability

The tool was used for a blind SQL injection vulnerability. The application uses a tracking cookie for analytics, and performs an SQL query containing the value of the submitted cookie.

The results of the SQL query are not returned, and the application does not respond any differently based on whether the query returns any rows. If the SQL query causes an error, then the application returns a custom error message.

Tool Overview

The tool Brute-force multiple requests trying all the alphanumeric characters based on the ascii table. when any charicter matches the first letter of the password it moves on to checkes the secound charcter and so on until the full password is identified.

How to Setup:

  1. Setup your burpsuite proxy to 127.0.0.1:8080

  2. Write the SQLi query and paste it in the sqli_payload paramenter

 for i in range(1,21):  # Lenght of the password
        for j in range(32,126):  # ascii character in decimal
            sqli_payload = " Paste Here " % (i,j)
  1. Paste the value of all the cookies in the cookies_sqli paramenter
cookies_sqli = {'TrackingId': 'Paste Here' + sqli_payload_encoded, 'session': 'Paste Here'}

Usage:

Use this command to run the python tool you just setup:

Python3 File-Name.py "Vulnerable URL"

Screenshot
Screenshot

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages