python检测网站url是否存在sql注入漏洞代码
代码语言:python
所属分类:web系统
代码描述:python检测网站url是否存在sql注入漏洞击代码
下面为部分代码预览,完整代码请点击下载或在bfwstudio webide中打开
#!/usr/local/python3/bin/python3 # -*- coding: utf-8 -* import requests # import re # uncomment this for DVWA from bs4 import BeautifulSoup as bs from urllib.parse import urljoin from pprint import pprint s = requests.Session() s.headers["User-Agent"] = "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.106 Safari/537.36" # below code is for logging to your local DVWA # uncomment it if you want to use this on DVWA # login_payload = { # "username": "admin", # "password": "password", # "Login": "Login", # } # # change URL to the login page of your DVWA login URL # login_url = "http://localhost:8080/DVWA-master/login.php" # # login # r = s.get(login_url) # token = re.search("user_token'\s*value='(.*?)'", r.text).group(1) # login_payload['user_token'] = token # s.post(login_url, data=login_payload) def get_all_forms(url): """通过url获取所有表单""" soup = bs(s.get(url).content, "html.parser") return soup.find_all("form") def get_form_details(form): """ 获取表单详细数据 """ details = {} # get the form action (target url) try: action = form.attrs.get("action").lower() except: action = None # get the form method (POST, GET, etc.) method = form.attrs.get("method", "get").lower() # get all the input details such as type and name inputs = [] for input_tag in form.find_all("input"): input_type = input_tag.attrs.get("type", "text") input_name = input_tag.attrs.get("name") input_value = input_tag.attrs.get("value", "") inputs.append({"type": input_type, "name": input_name, "value": input_value}) # put everything to the resulting dictionary details["action"] = action details["method"] = method details["inputs"] = inputs return details def is_vulnerable(response): """A simple boolean function that determines whether a page is SQL Injection vulnerable from its `response`""" errors = { # MySQL "you have an error in your sql syntax;", "warning: mysql", # SQL Server "unclosed quotation mark after the character string", # Oracle "quoted string n.........完整代码请登录后点击上方下载按钮下载查看
网友评论0