Skip to content

mtalbugaey/SQL-Injection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

SQL-Injection

This tool is built using the python programming language.

Code Description

Using the requests module to make requests to the web page.

import requests

Save the given URL as a variable.

URL = "http://testphp.vulnweb.com/listproducts.php?cat=1"

Open the given payload text file "sqlpayload.txt" in read mode Then read the lines to save the content in a list.

f = open("sqlpayload.txt","r")
lines = f.readlines()

Iterate through each index in the list from the previous step then combine the URL with the payload text file to check whether a URL is Vulnerable or not.

Then by using get method to retrieve data from a specified resource and content method to see the response’s content (this method access the raw bytes of the response payload, so convert them into a string).

If the returned response value has "Error in your SQL" It will be considered a Vulnerable Payload. Else it will be considered a Not Vulnerable Payload.

for x in lines:
newURL = URL + x
response = requests.get(newURL)
responseString = str(response.content)
if "error in your SQL" in responseString:
print("Vulnerable Payload! : " + x)
else:
print("Not Vulnerable Payload! : " + x)

The Output

sql1

Check Output

sql2



sql3

Releases

No releases published

Packages

No packages published

Languages