@@ -40,38 +40,38 @@ def vulnTest():
40
40
TESTS = (
41
41
("-h" , ("to see full list of options run with '-hh'" ,)),
42
42
("--dependencies --deprecations" , ("sqlmap requires" , "third-party library" , "~DeprecationWarning:" )),
43
- ("-u <url> --data=' reflect=1' --flush-session --wizard --disable-coloring" , ("Please choose:" , "back-end DBMS: SQLite" , "current user is DBA: True" , "banner: '3." )),
44
- ("-u <url> --data=' code=1' --code=200 --technique=B --banner --no-cast --flush-session" , ("back-end DBMS: SQLite" , "banner: '3." , "~COALESCE(CAST(" )),
43
+ ("-u <url> --data=\" reflect=1\" --flush-session --wizard --disable-coloring" , ("Please choose:" , "back-end DBMS: SQLite" , "current user is DBA: True" , "banner: '3." )),
44
+ ("-u <url> --data=\" code=1\" --code=200 --technique=B --banner --no-cast --flush-session" , ("back-end DBMS: SQLite" , "banner: '3." , "~COALESCE(CAST(" )),
45
45
(u"-c <config> --flush-session --output-dir=\" <tmpdir>\" --smart --roles --statements --hostname --privileges --sql-query=\" SELECT '\u0161 u\u0107 uraj'\" --technique=U" , (u": '\u0161 u\u0107 uraj'" , "on SQLite it is not possible" , "as the output directory" )),
46
46
(u"-u <url> --flush-session --sql-query=\" SELECT '\u0161 u\u0107 uraj'\" --technique=B --no-escape --string=luther --unstable" , (u": '\u0161 u\u0107 uraj'" ,)),
47
47
("-m <multiple> --flush-session --technique=B --banner" , ("/3] URL:" , "back-end DBMS: SQLite" , "banner: '3." )),
48
48
("--dummy" , ("all tested parameters do not appear to be injectable" , "does not seem to be injectable" , "there is not at least one" , "~might be injectable" )),
49
- ("-u ' <url>&id2=1' -p id2 -v 5 --flush-session --level=5 --text-only --test-filter=' AND boolean-based blind - WHERE or HAVING clause (MySQL comment)' " , ("~1AND" ,)),
49
+ ("-u \" <url>&id2=1\" -p id2 -v 5 --flush-session --level=5 --text-only --test-filter=\" AND boolean-based blind - WHERE or HAVING clause (MySQL comment)\" " , ("~1AND" ,)),
50
50
("--list-tampers" , ("between" , "MySQL" , "xforwardedfor" )),
51
- ("-r <request> --flush-session -v 5 --test-skip=' heavy' --save=<config>" , ("CloudFlare" , "web application technology: Express" , "possible DBMS: 'SQLite'" , "User-agent: foobar" , "~Type: time-based blind" , "saved command line options to the configuration file" )),
51
+ ("-r <request> --flush-session -v 5 --test-skip=\" heavy\" --save=<config>" , ("CloudFlare" , "web application technology: Express" , "possible DBMS: 'SQLite'" , "User-agent: foobar" , "~Type: time-based blind" , "saved command line options to the configuration file" )),
52
52
("-c <config>" , ("CloudFlare" , "possible DBMS: 'SQLite'" , "User-agent: foobar" , "~Type: time-based blind" )),
53
53
("-l <log> --flush-session --keep-alive --skip-waf -vvvvv --technique=U --union-from=users --banner --parse-errors" , ("banner: '3." , "ORDER BY term out of range" , "~xp_cmdshell" , "Connection: keep-alive" )),
54
54
("-l <log> --offline --banner -v 5" , ("banner: '3." , "~[TRAFFIC OUT]" )),
55
- ("-u <base> --flush-session --data=' id=1&_=Eewef6oh' --chunked --randomize=_ --random-agent --banner" , ("fetched random HTTP User-Agent header value" , "Parameter: id (POST)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." )),
56
- ("-u <base64> -p id --base64=id --data=' base64=true' --flush-session --banner --technique=B" , ("banner: '3." ,)),
57
- ("-u <base64> -p id --base64=id --data=' base64=true' --flush-session --tables --technique=U" , (" users " ,)),
58
- ("-u <url> --flush-session --banner --technique=B --disable-precon --not-string ' no results' " , ("banner: '3." ,)),
55
+ ("-u <base> --flush-session --data=\" id=1&_=Eewef6oh\" --chunked --randomize=_ --random-agent --banner" , ("fetched random HTTP User-Agent header value" , "Parameter: id (POST)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." )),
56
+ ("-u <base64> -p id --base64=id --data=\" base64=true\" --flush-session --banner --technique=B" , ("banner: '3." ,)),
57
+ ("-u <base64> -p id --base64=id --data=\" base64=true\" --flush-session --tables --technique=U" , (" users " ,)),
58
+ ("-u <url> --flush-session --banner --technique=B --disable-precon --not-string \" no results\" " , ("banner: '3." ,)),
59
59
("-u <url> --flush-session --encoding=gbk --banner --technique=B --first=1 --last=2" , ("banner: '3.'" ,)),
60
60
("-u <url> --flush-session --encoding=ascii --forms --crawl=2 --threads=2 --banner" , ("total of 2 targets" , "might be injectable" , "Type: UNION query" , "banner: '3." )),
61
- ("-u <base> --flush-session --data='{ \ " id\" : 1}' --banner" , ("might be injectable" , "3 columns" , "Payload: {\" id\" " , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." )),
62
- ("-u <base> --flush-session -H ' Foo: Bar' -H ' Sna: Fu' --data=' <root><param name=\" id\" value=\" 1*\" /></root>' --union-char=1 --mobile --answers=' smartphone=3' --banner --smart -v 5" , ("might be injectable" , "Payload: <root><param name=\" id\" value=\" 1" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." , "Nexus" , "Sna: Fu" , "Foo: Bar" )),
63
- ("-u <base> --flush-session --method=PUT --data=' a=1;id=1;b=2' --param-del=';' --skip-static --har=<tmpfile> --dump -T users --start=1 --stop=2" , ("might be injectable" , "Parameter: id (PUT)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "2 entries" )),
64
- ("-u <url> --flush-session -H ' id: 1*' --tables -t <tmpfile>" , ("might be injectable" , "Parameter: id #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
65
- ("-u <url> --flush-session --banner --invalid-logical --technique=B --predict-output --test-filter=' OR boolean' --tamper=space2dash" , ("banner: '3." , " LIKE " )),
61
+ ("-u <base> --flush-session --data=\" { \\ \ " id\\ \ " : 1}\" --banner" , ("might be injectable" , "3 columns" , "Payload: {\" id\" " , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." )),
62
+ ("-u <base> --flush-session -H \" Foo: Bar\" -H \" Sna: Fu\" --data=\" <root><param name=\\ \ " id\\ \ " value=\\ \ " 1*\\ \ " /></root>\" --union-char=1 --mobile --answers=\" smartphone=3\" --banner --smart -v 5" , ("might be injectable" , "Payload: <root><param name=\" id\" value=\" 1" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." , "Nexus" , "Sna: Fu" , "Foo: Bar" )),
63
+ ("-u <base> --flush-session --method=PUT --data=\" a=1;id=1;b=2\" --param-del=\" ; \" --skip-static --har=<tmpfile> --dump -T users --start=1 --stop=2" , ("might be injectable" , "Parameter: id (PUT)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "2 entries" )),
64
+ ("-u <url> --flush-session -H \" id: 1*\" --tables -t <tmpfile>" , ("might be injectable" , "Parameter: id #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
65
+ ("-u <url> --flush-session --banner --invalid-logical --technique=B --predict-output --test-filter=\" OR boolean\" --tamper=space2dash" , ("banner: '3." , " LIKE " )),
66
66
("-u <url> --flush-session --cookie=\" PHPSESSID=d41d8cd98f00b204e9800998ecf8427e; id=1*; id2=2\" --tables --union-cols=3" , ("might be injectable" , "Cookie #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
67
67
("-u <url> --flush-session --null-connection --technique=B --tamper=between,randomcase --banner --count -T users" , ("NULL connection is supported with HEAD method" , "banner: '3." , "users | 5" )),
68
68
("-u <url> --flush-session --parse-errors --test-filter=\" subquery\" --eval=\" import hashlib; id2=2; id3=hashlib.md5(id.encode()).hexdigest()\" --referer=\" localhost\" " , ("might be injectable" , ": syntax error" , "back-end DBMS: SQLite" , "WHERE or HAVING clause (subquery" )),
69
69
("-u <url> --banner --schema --dump -T users --binary-fields=surname --where \" id>3\" " , ("banner: '3." , "INTEGER" , "TEXT" , "id" , "name" , "surname" , "2 entries" , "6E616D6569736E756C6C" )),
70
70
("-u <url> --technique=U --fresh-queries --force-partial --dump -T users --dump-format=HTML --answers=\" crack=n\" -v 3" , ("performed 6 queries" , "nameisnull" , "~using default dictionary" , "dumped to HTML file" )),
71
71
("-u <url> --flush-session --all" , ("5 entries" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "luther" , "blisset" , "fluffy" , "179ad45c6ce2cb97cf1029e212046e81" , "NULL" , "nameisnull" , "testpass" )),
72
72
("-u <url> -z \" tec=B\" --hex --fresh-queries --threads=4 --sql-query=\" SELECT * FROM users\" " , ("SELECT * FROM users [5]" , "nameisnull" )),
73
- ("-u ' <url>&echo=foobar*' --flush-session" , ("might be vulnerable to cross-site scripting" ,)),
74
- ("-u ' <url>&query=*' --flush-session --technique=Q --banner" , ("Title: SQLite inline queries" , "banner: '3." )),
73
+ ("-u \" <url>&echo=foobar*\" --flush-session" , ("might be vulnerable to cross-site scripting" ,)),
74
+ ("-u \" <url>&query=*\" --flush-session --technique=Q --banner" , ("Title: SQLite inline queries" , "banner: '3." )),
75
75
("-d <direct> --flush-session --dump -T users --dump-format=SQLITE --binary-fields=name --where \" id=3\" " , ("7775" , "179ad45c6ce2cb97cf1029e212046e81 (testpass)" , "dumped to SQLITE database" )),
76
76
("-d <direct> --flush-session --banner --schema --sql-query=\" UPDATE users SET name='foobar' WHERE id=5; SELECT * FROM users; SELECT 987654321\" " , ("banner: '3." , "INTEGER" , "TEXT" , "id" , "name" , "surname" , "5, foobar, nameisnull" , "'987654321'" ,)),
77
77
("--purge -v 3" , ("~ERROR" , "~CRITICAL" , "deleting the whole directory tree" )),
0 commit comments