zl程序教程

您现在的位置是:首页 >  其他

当前栏目

SQLiScanner:又一款基于SQLMAP和Charles的被动SQL 注入漏洞扫描工具

漏洞注入SQL工具 基于 一款 扫描 Charles
2023-06-13 09:15:50 时间

从内部安全平台 分离出来的一个模块, 支持 Har 文件的扫描(搭配 Charles 使用: Tools= Auto Save)

sqlmap 复现命令生成 Python 3.x Django 1.9 PostgreSQL Celery sqlmap redis Linux

SQLiScanner:又一款基于SQLMAP和Charles的被动SQL 注入漏洞扫描工具

SQLiScanner:又一款基于SQLMAP和Charles的被动SQL 注入漏洞扫描工具SQLiScanner:又一款基于SQLMAP和Charles的被动SQL 注入漏洞扫描工具SQLiScanner:又一款基于SQLMAP和Charles的被动SQL 注入漏洞扫描工具

克隆项目到本地

git clone https://github.com/0xbug/SQLiScanner.git --depth 1

配置 sqlmap:

git clone https://github.com/sqlmapproject/sqlmap.git --depth 1

SQLiScanner 支持 Python version 3.x on Linux and osx.

安装依赖

cd SQLiScanner/

virtualenv --python=/usr/local/bin/python3.5 venv

source venv/bin/activate

pip install -r requirements.txt

创建数据库(需要配置数据库)

python manage.py makemigrations scanner

python manage.py migrate

创建 superuser

python manage.py createsuperuser

数据库设置

SQLiScanner/settings.py:85

DATABASES = {

 default: {

 ENGINE: django.db.backends.postgresql,

 NAME: ,

 USER: ,

 PASSWORD: ,

 HOST: 127.0.0.1,

 PORT: 5432,

邮件通知配置

SQLiScanner/settings.py:152

# Email

EMAIL_BACKEND = django.core.mail.backends.smtp.EmailBackend

EMAIL_USE_TLS = False

EMAIL_HOST = 

EMAIL_PORT = 25

EMAIL_HOST_USER = 

EMAIL_HOST_PASSWORD = 

DEFAULT_FROM_EMAIL = 

scanner/tasks.py:13

class SqlScanTask(object):

 def __init__(self, sqli_obj):

 self.api_url = "http://127.0.0.1:8775"

 self.mail_from = ""

 self.mail_to = [""]

redis-server

python sqlmapapi.py -s -p 8775

python manage.py celery worker --loglevel=info

python manage.py runserver

原创文章,作者:Maggie-Hunter,如若转载,请注明出处:https://blog.ytso.com/56194.html

linuxpythonRedis