搜索
查看: 548|回复: 0

检测SQL注入工具:SQLi-Hunter

[复制链接]

1839

主题

2255

帖子

1万

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
11913
发表于 2015-3-12 01:30:07 | 显示全部楼层 |阅读模式
from:https://github.com/zt2/sqli-hunter

封装了一个http代理跟sqlmap的api配合检测SQLi。

需要:
  1. Ruby > 2.0.0
  2. sqlmap
复制代码
安装:

sqlmap
  1. git clone https://github.com/sqlmapproject/sqlmap.git
复制代码
gem
  1. cd sqli-hunter
  2. gem install bundle
  3. bundle install
复制代码
使用:
  1. ➜ sqli-hunter git:(master) ruby sqli-hunter.rb

  2. _____ _____ __ _ _____ _
  3. | __| | | |_|___| | |_ _ ___| |_ ___ ___
  4. |__ | | | |__| |___| | | | | _| -_| _|
  5. |_____|__ _|_____|_| |__|__|___|_|_|_| |___|_|
  6. |__|


  7. Usage: sqli-hunter.rb [options]

  8. Common options:
  9. -s, --server Act as a Proxy-Server
  10. -p, --port=<PORT> Port of the Proxy-Server (default is 8888)
  11. --api-host=<HOST> Host of the sqlmapapi (default is localhost:8775)
  12. --version Show version

  13. SQLMap options
  14. --random-agent Use randomly selected HTTP User-Agent header value
  15. --threads=<THREADS> Max number of concurrent HTTP(s) requests (default 10)
  16. --dbms=<DBMS> Force back-end DBMS to this value
  17. --os=<OS> Force back-end DBMS operating system to this value
  18. --tamper=<TAMPER> Use given script(s) for tampering injection data
  19. --level=<LEVEL> Level of tests to perform (1-5, default 1)
  20. --risk=<RISK> Risk of tests to perform (0-3, default 1)
  21. --batch Never ask for user input, use the default behaviour
  22. --mobile Imitate smartphone through HTTP User-Agent header
  23. --smart Conduct through tests only if positive heuristic(s)
复制代码
开启sqlmapapi
  1. python sqlmapapi.py -s
复制代码


开启代理服务
  1. ruby sqli-hunter.rb -s -p 8888
复制代码


配置浏览器的代理
  1. ~/Code/SQLi-Hunter(master) ruby sqli-hunter.rb -s -p 8888
  2. [2015-01-08 17:17:27] INFO WEBrick 1.3.1
  3. [2015-01-08 17:17:27] INFO ruby 2.1.3 (2014-09-19) [x86_64-linux]
  4. [2015-01-08 17:17:27] INFO WEBrick::HTTPProxyServer#start: pid=9533 port=8888
  5. 192.168.3.98 - - [08/Jan/2015:17:17:31 HKT] "GET http://testphp.vulnweb.com/artists.php?artist=1 HTTP/1.1" 200 5384
  6. - -> http://testphp.vulnweb.com/artists.php?artist=1
  7. [+] Vulnerable: e2f84b1494893827 requestFile: /tmp/c94863efe7bf03459aea27877426dada
复制代码


然后开搞
  1. python sqlmap.py -r /tmp/c94863efe7bf03459aea27877426dada
复制代码

过段时间可能会取消签到功能了
您需要登录后才可以回帖 登录 | Join BUC

本版积分规则

Powered by Discuz!

© 2012-2015 Baiker Union of China.

快速回复 返回顶部 返回列表