@@ -67,24 +67,24 @@ def vulnTest():
6767 TESTS = (
6868 ("--list-tampers" , ("between" , "MySQL" , "xforwardedfor" )),
6969 ("-r <request> --flush-session" , ("CloudFlare" , "possible DBMS: 'SQLite'" )),
70- ("-l <log> --flush-session --skip-waf -v 3 --technique=U --union-from=users --banner --parse-errors" , ("banner: '3" , "ORDER BY term out of range" , "~xp_cmdshell" )),
71- ("-l <log> --offline --banner -v 5" , ("banner: '3" , "~[TRAFFIC OUT]" )),
72- ("-u <url> --flush-session --encoding=ascii --forms --crawl=2 --threads=2 --banner" , ("total of 2 targets" , "might be injectable" , "Type: UNION query" , "banner: '3" )),
73- ("-u <url> --flush-session --data='{\" id\" : 1}' --banner" , ("might be injectable" , "3 columns" , "Payload: {\" id\" " , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3" )),
74- ("-u <url> --flush-session --data='<root><param name=\" id\" value=\" 1*\" /></root>' --union-char=1 --mobile --answers='smartphone=3' --banner --smart -v 5" , ("might be injectable" , "Payload: <root><param name=\" id\" value=\" 1" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3" , "Nexus" )),
70+ ("-l <log> --flush-session --skip-waf -v 3 --technique=U --union-from=users --banner --parse-errors" , ("banner: '3. " , "ORDER BY term out of range" , "~xp_cmdshell" )),
71+ ("-l <log> --offline --banner -v 5" , ("banner: '3. " , "~[TRAFFIC OUT]" )),
72+ ("-u <url> --flush-session --encoding=ascii --forms --crawl=2 --threads=2 --banner" , ("total of 2 targets" , "might be injectable" , "Type: UNION query" , "banner: '3. " )),
73+ ("-u <url> --flush-session --data='{\" id\" : 1}' --banner" , ("might be injectable" , "3 columns" , "Payload: {\" id\" " , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3. " )),
74+ ("-u <url> --flush-session --data='<root><param name=\" id\" value=\" 1*\" /></root>' --union-char=1 --mobile --answers='smartphone=3' --banner --smart -v 5" , ("might be injectable" , "Payload: <root><param name=\" id\" value=\" 1" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3. " , "Nexus" )),
7575 ("-u <url> --flush-session --method=PUT --data='a=1&b=2&c=3&id=1' --skip-static --dump -T users --start=1 --stop=2" , ("might be injectable" , "Parameter: id (PUT)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "2 entries" )),
7676 ("-u <url> --flush-session -H 'id: 1*' --tables" , ("might be injectable" , "Parameter: id #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
77- ("-u <url> --flush-session --banner --invalid-logical --technique=B --test-filter='OR boolean' --tamper=space2dash" , ("banner: '3" , " LIKE " )),
77+ ("-u <url> --flush-session --banner --invalid-logical --technique=B --test-filter='OR boolean' --tamper=space2dash" , ("banner: '3. " , " LIKE " )),
7878 ("-u <url> --flush-session --cookie=\" PHPSESSID=d41d8cd98f00b204e9800998ecf8427e; id=1*; id2=2\" --tables --union-cols=3" , ("might be injectable" , "Cookie #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
79- ("-u <url> --flush-session --null-connection --technique=B --tamper=between,randomcase --banner" , ("NULL connection is supported with HEAD method" , "banner: '3" )),
79+ ("-u <url> --flush-session --null-connection --technique=B --tamper=between,randomcase --banner" , ("NULL connection is supported with HEAD method" , "banner: '3. " )),
8080 ("-u <url> --flush-session --parse-errors --test-filter=\" subquery\" --eval=\" import hashlib; id2=2; id3=hashlib.md5(id.encode()).hexdigest()\" --referer=\" localhost\" " , ("might be injectable" , ": syntax error" , "back-end DBMS: SQLite" , "WHERE or HAVING clause (subquery" )),
81- ("-u <url> --banner --schema --dump -T users --binary-fields=surname --where \" id>3\" " , ("banner: '3" , "INTEGER" , "TEXT" , "id" , "name" , "surname" , "2 entries" , "6E616D6569736E756C6C" )),
81+ ("-u <url> --banner --schema --dump -T users --binary-fields=surname --where \" id>3\" " , ("banner: '3. " , "INTEGER" , "TEXT" , "id" , "name" , "surname" , "2 entries" , "6E616D6569736E756C6C" )),
8282 ("-u <url> --flush-session --all" , ("5 entries" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "luther" , "blisset" , "fluffy" , "179ad45c6ce2cb97cf1029e212046e81" , "NULL" , "nameisnull" , "testpass" )),
8383 ("-u <url> -z \" tec=B\" --hex --fresh-queries --threads=4 --sql-query=\" SELECT * FROM users\" " , ("SELECT * FROM users [5]" , "nameisnull" )),
8484 ("-u '<url>&echo=foobar*' --flush-session" , ("might be vulnerable to cross-site scripting" ,)),
85- ("-u '<url>&query=*' --flush-session --technique=Q --banner" , ("Title: SQLite inline queries" , "banner: '3" )),
85+ ("-u '<url>&query=*' --flush-session --technique=Q --banner" , ("Title: SQLite inline queries" , "banner: '3. " )),
8686 ("-d <direct> --flush-session --dump -T users --binary-fields=name --where \" id=3\" " , ("7775" , "179ad45c6ce2cb97cf1029e212046e81 (testpass)" ,)),
87- ("-d <direct> --flush-session --banner --schema --sql-query=\" UPDATE users SET name='foobar' WHERE id=5; SELECT * FROM users; SELECT 987654321\" " , ("banner: '3" , "INTEGER" , "TEXT" , "id" , "name" , "surname" , "5, foobar, nameisnull" , "[*] 987654321" ,)),
87+ ("-d <direct> --flush-session --banner --schema --sql-query=\" UPDATE users SET name='foobar' WHERE id=5; SELECT * FROM users; SELECT 987654321\" " , ("banner: '3. " , "INTEGER" , "TEXT" , "id" , "name" , "surname" , "5, foobar, nameisnull" , "[*] 987654321" ,)),
8888 )
8989
9090 retVal = True
0 commit comments