Sqlmap Tamper WAF Bypasses script list comments

Source: Internet
Author: User

Sqlmap's Tamper directory has 41 scripts to bypass the WAF, and the online an article briefly describes how to use them, but it simply says a few of them. I use the documentation comments of these 41 scripts to simply mark each of their functions, or as before, Google Translate and then manually polished. In fact, there are examples of document comments, look at a glance will probably know the effect, than to see the text description of the speed is faster, but to use when the scene to look over or too much trouble. This list gives you a reference to quickly locate the scripts you need.


My English reading ability is limited, there are individual words (in fact, 2 places) really do not know how to translate, the English copied over. In addition, although a lot of Kung fu translation and proofreading, but since the mistake is unavoidable, we have found that I translated the wrong, please point out, thank you.
Apostrophemask.py replaces single-quote characters with UTF-8 full-width characters
apostrophenullencode.py replacing single quote characters with illegal double-byte Unicode characters
appendnullbyte.py. Add an empty character encoding at the end of payload
base64encode.py use BASE64 encoding for a given payload all characters
between.py with "not between 0 and #" to replace the greater than sign ">", "Between # and #" to replace the equals sign "="
Bluecoat.py replaced the whitespace with a valid random space character after the SQL statement, followed by "like" with the equals sign "="
chardoubleencode.py use double-URL encoding for all characters given payload (do not process encoded characters)
charencode.py. URL encoding for all characters given payload (do not process encoded characters)
charunicodeencode.py uses Unicode URL encoding for a given payload non-encoded character (does not process encoded characters)
Concat2concatws.py replacing an instance of "CONCAT (A, B)" with "Concat_ws (MID (CHAR (0), 0, 0), A, b)"
equaltolike.py. Replace all equals sign "=" with "like" operator
greatest.py replace the greater than sign ">" With the "greatest" function
halfversionedmorekeywords.py add a MySQL comment before each keyword
Ifnull2ifisnull.py replacing instances with "IF (ISNULL (a), B, A)" as "Ifnull (A, B)"
lowercase.py replace each keyword character with a lowercase value
modsecurityversioned.py surround a complete query with annotations
modsecurityzeroversioned.py the full query with a comment with a number zero
multiplespaces.py add multiple spaces around the SQL keyword
nonrecursivereplacement.py replacing predefined SQL keywords with representations for filters
overlongutf8.py convert all characters in a given payload
percentage.py. Add a percent semicolon before each character
Randomcase.py randomly converts the case of each keyword character
randomcomments.py inserting a random comment into the SQL keyword
securesphere.py adding a specially constructed string
sp_password.py Add "sp_password" for automatic obfuscation from DBMS logs to the end of payload
space2comment.py replacing whitespace with "/**/"
space2dash.py with dash notation "--" followed by a random string and a newline character to replace the whitespace
space2hash.py with the pound notation "#" followed by a random string and a newline character to replace the whitespace
space2morehash.py with the pound notation "#" followed by a random string and a newline character to replace the whitespace
space2mssqlblank.py replacing whitespace with random whitespace characters from a valid set of alternate character sets
space2mssqlhash.py with the pound notation "#" followed by a newline character replacing the whitespace
space2mysqlblank.py replace whitespace with random whitespace characters from a valid set of alternate character sets
space2mysqldash.py with dash notation "--" followed by a newline character replacing whitespace
space2plus.py replacing whitespace with a plus "+"
space2randomblank.py replace whitespace with random whitespace characters from a valid set of alternate character sets
unionalltounion.py Replace "union ALL Select" with "union select"
Panax Notoginseng. unmagicquotes.py replacing whitespace with a multibyte combination%bf%27 and the end-of-general comment
varnish.py Add an HTTP Header "X-originating-ip" to bypass the WAF
versionedkeywords.py surround each non-function keyword with mysql annotations
versionedmorekeywords.py surround each keyword with MySQL annotations
xforwardedfor.py add a forged HTTP header "X-forwarded-for" to bypass the WAF

This article is from the "Phenex" blog, make sure to keep this source http://phenex.blog.51cto.com/10579566/1680773

Sqlmap Tamper WAF Bypasses script list comments

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.