Skip to content

Exploit Time-Based SQL Injection | Retrieve Database Informations

License

Notifications You must be signed in to change notification settings

Orangiuss/SQLTimeProbe

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation


SQLTimeProbe ๐Ÿ•ต๏ธโ€โ™‚๏ธ - Exploit Time-Based SQL Injection

SQLTimeProbe is a simple Python script designed to exploit Time-Based SQL Injection vulnerabilities.

alt text

Description ๐Ÿ“

Time-Based SQL Injection is a type of SQL Injection attack that relies on the database management system's (DBMS) time delays to infer information about the database. This script automates the process of exploiting Time-Based SQL Injection vulnerabilities, making it easier to test and secure web applications.

Features โš™๏ธ

  • Automated Time-Based SQL Injection exploitation
  • Easy to use with a simple command-line interface
  • Retrieve database name and tables with column and column name like [%password%] (and others if you want..)

Usage ๐Ÿš€

  1. Clone the repository:
git clone https://github.com/Orangiuss/SQLTimeProbe.git
  1. Navigate to the SQLTimeProbe directory:
cd SQLTimeProbe
  1. And enjoy ;) :
python sqltimeprobe.py -u <target_url> -p <params_with_fuzz> [-a | --attack] [-V | --verify] [-vv]

Example :

python sqltimeprobe.py -u http://example.com -p "test=<@urlencode>OK' AND (SELECT 6222 FROM (FUZZ)Nhou) AND 'VRpn'='VRpn<@/urlencode> [-a | --attack] [-V | --verify] [-vv]

Image example :

alt text

Disclaimer โš ๏ธ

This tool is intended for educational purposes only. Misuse of this tool on websites without prior authorization is illegal and could lead to legal consequences.

Contributing ๐Ÿค

Contributions are welcome! Feel free to open an issue or submit a pull request.