This guide outlines the process to detect blind SQL injection vulnerabilities using a combination of tools:
- URL Crawling: Use
waybackurls
orgau
to crawl and collect URLs from the target domain. - Pattern Matching: Utilize
gf
for pattern matching to identify potential SQL injection parameters. - Parameter Extraction: Extract parameters from the collected URLs with
paramspider
. - Blind SQL Injection Testing: Use the
juNgl3FuRy
tool to find blind SQL injection vulnerabilities.
- waybackurls: Tool for extracting URLs from the Wayback Machine.
- gf: A tool for pattern matching and filtering URLs.
- paramspider: A tool for extracting parameters from URLs.
- juNgl3FuRy: A tool used to find blind SQL injection vulnerabilities.
Ensure that all tools are installed and properly configured on your system.
Use waybackurls
or gau
to collect URLs from the target domain.
waybackurls domain.com | gf sqli > sqli.txt
waybackurls domain.com
: Fetches all URLs from the Wayback Machine for the specified domain.gf sqli
: Filters URLs for potential SQL injection vulnerabilities.> sqli.txt
: Outputs the filtered URLs tosqli.txt
.
Alternatively, you can use gau
:
gau domain.com | gf sqli > sqli.txt
gau domain.com
: Fetches all URLs from public sources for the specified domain.gf sqli
: Filters URLs for potential SQL injection vulnerabilities.> sqli.txt
: Outputs the filtered URLs tosqli.txt
.
Run paramspider
to extract parameters from the collected URLs.
paramspider -d domain.com
-d domain.com
: Specifies the domain to extract parameters from.
Process the extracted parameters to prepare for SQL injection testing.
cat results/domain.com.txt | sed 's/=.*/=/' > output.txt
cat results/domain.com.txt
: Reads the extracted parameters.sed 's/=.*/=/'
: Normalizes the parameters by removing values.> output.txt
: Outputs the processed parameters tooutput.txt
.
Use the juNgl3FuRy
tool to find blind SQL injection vulnerabilities in the parameters.
python3 sqliscanner.py -u http://example.com?param= -p payloads/xor.txt
-u http://example.com?param=
: Specifies the target URL with a parameter to test.-w output.txt
: Uses the processed parameters file for testing.
After following these steps, juNgl3FuRy
will help you identify potential blind SQL injection vulnerabilities in the target application.
Happy Day, Happy Hacking...🌱🌱🌱!!!