@@ -62,7 +62,7 @@ def vulnTest():
6262 ("-u <base> --flush-session -H \" Foo: Bar\" -H \" Sna: Fu\" --data=\" <root><param name=\\ \" id\\ \" value=\\ \" 1*\\ \" /></root>\" --union-char=1 --mobile --answers=\" smartphone=3\" --banner --smart -v 5" , ("might be injectable" , "Payload: <root><param name=\" id\" value=\" 1" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." , "Nexus" , "Sna: Fu" , "Foo: Bar" )),
6363 ("-u <base> --flush-session --technique=BU --method=PUT --data=\" a=1;id=1;b=2\" --param-del=\" ;\" --skip-static --har=<tmpfile> --dump -T users --start=1 --stop=2" , ("might be injectable" , "Parameter: id (PUT)" , "Type: boolean-based blind" , "Type: UNION query" , "2 entries" )),
6464 ("-u <url> --flush-session -H \" id: 1*\" --tables -t <tmpfile>" , ("might be injectable" , "Parameter: id #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
65- ("-u <url> --flush-session --banner --invalid-logical --technique=B --predict-output --test-filter=\" OR boolean\" --tamper=space2dash" , ("banner: '3." , " LIKE " )),
65+ ("-u <url> --flush-session --banner --invalid-logical --technique=B --predict-output --titles -- test-filter=\" OR boolean\" --tamper=space2dash" , ("banner: '3." , " LIKE " )),
6666 ("-u <url> --flush-session --cookie=\" PHPSESSID=d41d8cd98f00b204e9800998ecf8427e; id=1*; id2=2\" --tables --union-cols=3" , ("might be injectable" , "Cookie #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
6767 ("-u <url> --flush-session --null-connection --technique=B --tamper=between,randomcase --banner --count -T users" , ("NULL connection is supported with HEAD method" , "banner: '3." , "users | 5" )),
6868 ("-u <base> --data=\" aWQ9MQ==\" --flush-session --base64=POST -v 6" , ("aWQ9MTtXQUlURk9SIERFTEFZICcwOjA" ,)),
@@ -74,7 +74,7 @@ def vulnTest():
7474 ("-u \" <url>&echo=foobar*\" --flush-session" , ("might be vulnerable to cross-site scripting" ,)),
7575 ("-u \" <url>&query=*\" --flush-session --technique=Q --banner" , ("Title: SQLite inline queries" , "banner: '3." )),
7676 ("-d \" <direct>\" --flush-session --dump -T creds --dump-format=SQLITE --binary-fields=password_hash --where \" user_id=5\" " , ("3137396164343563366365326362393763663130323965323132303436653831" , "dumped to SQLITE database" )),
77- ("-d \" <direct>\" --flush-session --banner --schema --sql-query=\" UPDATE users SET name='foobar' WHERE id=5 ; SELECT * FROM users; SELECT 987654321\" " , ("banner: '3." , "INTEGER" , "TEXT" , "id" , "name" , "surname" , "5 ,foobar,nameisnull" , "'987654321'" ,)),
77+ ("-d \" <direct>\" --flush-session --banner --schema --sql-query=\" UPDATE users SET name='foobar' WHERE id=4 ; SELECT * FROM users; SELECT 987654321\" " , ("banner: '3." , "INTEGER" , "TEXT" , "id" , "name" , "surname" , "4 ,foobar,nameisnull" , "'987654321'" ,)),
7878 ("-u <base>csrf --data=\" id=1&csrf_token=1\" --banner --answers=\" update=y\" --flush-session" , ("back-end DBMS: SQLite" , "banner: '3." )),
7979 ("--purge -v 3" , ("~ERROR" , "~CRITICAL" , "deleting the whole directory tree" )),
8080 )
0 commit comments