Skip to content

Commit

Permalink
test
Browse files Browse the repository at this point in the history
  • Loading branch information
root committed Feb 14, 2017
1 parent 75d7fc1 commit 0734733
Showing 1 changed file with 9 additions and 9 deletions.
18 changes: 9 additions & 9 deletions UrlCheckSqli.py
Original file line number Diff line number Diff line change
Expand Up @@ -99,31 +99,31 @@ def basicSqliCheck(r,url, payload):
text = ''.join(soup.text)
if (
'Microsoft OLE DB Provider for ODBC Drivers error' in text or 'Microsoft SQL Native Client error' in text):
print(Fore.RED,Style.BRIGHT, "["+str(datetime.datetime.hour)+":"+str(datetime.datetime.munite)+":"+ str(datetime.datetime.second)+ "] seems to be vulnerable to SQL injection")
print(Fore.GREEN,Style.BRIGHT,"["+datetime. datetime.time().hour+":"+str(datetime.datetime.munite)+":"+ str(datetime.datetime.second)+ "] Possible database : MS SQl server")
print(Fore.RED,Style.BRIGHT,"["+str(datetime.datetime.now().hour)+":"+str(datetime.datetime.now().minute)+":"+ str(datetime.datetime.now().second)+ "] seems to be vulnerable to SQL injection")
print(Fore.GREEN,Style.BRIGHT,"["+datetime. datetime.time().hour+":"+str(datetime.datetime.minute)+":"+ str(datetime.datetime.second)+ "] Possible database : MS SQl server")
saveResults(payload, url)
return

elif ("error in your SQL syntax" in text):
print(Fore.RED,Style.BRIGHT,"["+str(datetime.datetime.hour)+":"+str(datetime.datetime.munite)+":"+ str(datetime.datetime.second)+ "] seems to be vulnerable to SQL injection")
print(Fore.GREEN,Style.BRIGHT,"["+str(datetime.datetime.hour)+":"+str(datetime.datetime.munite)+":"+ str(datetime.datetime.second)+ "] Possible database: MySQl")
print(Fore.RED,Style.BRIGHT,"["+str(datetime.datetime.now().hour)+":"+str(datetime.datetime.now().minute)+":"+ str(datetime.datetime.now().second)+ "] seems to be vulnerable to SQL injection")
print(Fore.GREEN,Style.BRIGHT,"["+str(datetime.datetime.now().hour)+":"+str(datetime.datetime.now().minute)+":"+ str(datetime.datetime.now().second)+ "] Possible database: MySQl")
saveResults(payload, url)
return

elif ("SQL command not properly ended" in text):
print(Fore.RED,Style.BRIGHT,"["+str(datetime.datetime.hour)+":"+str(datetime.datetime.munite)+":"+ str(datetime.datetime.second)+ "] seems to be vulnerable to SQL injection")
print(Fore.GREEN,Style.BRIGHT,"["+str(datetime.datetime.hour)+":"+str(datetime.datetime.munite)+":"+ str(datetime.datetime.second)+ "] Possible database :Oracle")
print(Fore.RED,Style.BRIGHT,"["+str(datetime.datetime.now().hour)+":"+str(datetime.datetime.now().minute)+":"+ str(datetime.datetime.now().second)+ "] seems to be vulnerable to SQL injection")
print(Fore.GREEN,Style.BRIGHT,"["+str(datetime.datetime.now().hour)+":"+str(datetime.datetime.now().minute)+":"+ str(datetime.datetime.now().second)+ "] Possible database :Oracle")
saveResults(payload, url)
return
elif ("Query failed: ERROR: syntax error at or near" in text):
print(Fore.RED,Style.BRIGHT,"["+str(datetime.datetime.hour)+":"+str(datetime.datetime.munite)+":"+ str(datetime.datetime.second)+ "] seems to be vulnerable to SQL injection")
print(Fore.GREEN,Style.BRIGHT,"["+str(datetime.datetime.hour)+":"+str(datetime.datetime.munite)+":"+ str(datetime.datetime.second)+ "] Possible database :Oracle")
print(Fore.RED,Style.BRIGHT,"["+str(datetime.datetime.now().hour)+":"+str(datetime.datetime.now().minute)+":"+ str(datetime.datetime.now().second)+ "] seems to be vulnerable to SQL injection")
print(Fore.GREEN,Style.BRIGHT,"["+str(datetime.datetime.now().hour)+":"+str(datetime.datetime.now().minute)+":"+ str(datetime.datetime.now().second)+ "] Possible database :Oracle")
saveResults(payload, url)
return


except BaseException as e:
#print(str(e))
print(str(e))
return


Expand Down

0 comments on commit 0734733

Please sign in to comment.