@@ -69,14 +69,14 @@ def vulnTest():
69
69
(u"-u <url> --flush-session --sql-query=\" SELECT '\u0161 u\u0107 uraj'\" --technique=B --no-escape" , (u": '\u0161 u\u0107 uraj'" ,)),
70
70
("--list-tampers" , ("between" , "MySQL" , "xforwardedfor" )),
71
71
("-r <request> --flush-session -v 5" , ("CloudFlare" , "possible DBMS: 'SQLite'" , "User-agent: foobar" )),
72
- ("-l <log> --flush-session --skip-waf -v 3 --technique=U --union-from=users --banner --parse-errors" , ("banner: '3." , "ORDER BY term out of range" , "~xp_cmdshell" )),
72
+ ("-l <log> --flush-session --keep-alive -- skip-waf -v 5 --technique=U --union-from=users --banner --parse-errors" , ("banner: '3." , "ORDER BY term out of range" , "~xp_cmdshell" , "Connection: keep-alive " )),
73
73
("-l <log> --offline --banner -v 5" , ("banner: '3." , "~[TRAFFIC OUT]" )),
74
74
("-u <url> --flush-session --encoding=ascii --forms --crawl=2 --threads=2 --banner" , ("total of 2 targets" , "might be injectable" , "Type: UNION query" , "banner: '3." )),
75
75
("-u <url> --flush-session --data='{\" id\" : 1}' --banner" , ("might be injectable" , "3 columns" , "Payload: {\" id\" " , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." )),
76
76
("-u <url> --flush-session -H 'Foo: Bar' -H 'Sna: Fu' --data='<root><param name=\" id\" value=\" 1*\" /></root>' --union-char=1 --mobile --answers='smartphone=3' --banner --smart -v 5" , ("might be injectable" , "Payload: <root><param name=\" id\" value=\" 1" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." , "Nexus" , "Sna: Fu" , "Foo: Bar" )),
77
77
("-u <url> --flush-session --method=PUT --data='a=1&b=2&c=3&id=1' --skip-static --dump -T users --start=1 --stop=2" , ("might be injectable" , "Parameter: id (PUT)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "2 entries" )),
78
78
("-u <url> --flush-session -H 'id: 1*' --tables" , ("might be injectable" , "Parameter: id #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
79
- ("-u <url> --flush-session --banner --invalid-logical --technique=B --test-filter='OR boolean' --tamper=space2dash" , ("banner: '3." , " LIKE " )),
79
+ ("-u <url> --flush-session --banner --invalid-logical --technique=B --predict-output -- test-filter='OR boolean' --tamper=space2dash" , ("banner: '3." , " LIKE " )),
80
80
("-u <url> --flush-session --cookie=\" PHPSESSID=d41d8cd98f00b204e9800998ecf8427e; id=1*; id2=2\" --tables --union-cols=3" , ("might be injectable" , "Cookie #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
81
81
("-u <url> --flush-session --null-connection --technique=B --tamper=between,randomcase --banner" , ("NULL connection is supported with HEAD method" , "banner: '3." )),
82
82
("-u <url> --flush-session --parse-errors --test-filter=\" subquery\" --eval=\" import hashlib; id2=2; id3=hashlib.md5(id.encode()).hexdigest()\" --referer=\" localhost\" " , ("might be injectable" , ": syntax error" , "back-end DBMS: SQLite" , "WHERE or HAVING clause (subquery" )),
0 commit comments