python gdork sqli: Automatically Finding and Exploiting SQL injection
Find SQL injections
This python script is developed to show, how many vulnerable websites, which are laying around on the web. The main focus of the script is to generate a list of vuln urls. Please use the script with causing and alert the webadmins of vulnerable pages. The SQLmap implementation is just for showcasing.
Installing
git clone https://github.com/ThomasTJdev/python_gdork_sqli.git
apt-get install python3-dev python3-pip pip3 install bs4 psutil
cd python_gdork_sqli
python3 findsqlinj.py
Usage
- On section 1: In this section, you’ll have to provide a search string, which ‘connects’ to the database of the website, e.g. ‘php?id=’. The script then crawls Bing or Google for urls containing it. All of the urls can then be saved into a file. (Please be aware that you might get banned for crawling too fast, remember an appropriate break/sleep between request). Example of searches: php?bookid=, php?idproduct=, php?bookid=, php?catid=, php?action=, php?cart_id=, php?title=, php?itemid= . You can get more sqli dork list here.
- On section 2: This section adds a qoute ‘ to the websites url. If the website is prone to SQL injection, we’ll catch this with some predefined error messages. The script will not add websites for blind SQL injections, due to the predefined error messages.
- On section 3: This is just an activation of sqlmap with the bulk argument and no user interaction for validation of SQL injection.
Note: You should use the tamper with sqlmap for bypassing waf.