首页| JavaScript| HTML/CSS| Matlab| PHP| Python| Java| C/C++/VC++| C#| ASP| 其他|
购买积分 购买会员 激活码充值

您现在的位置是:虫虫源码 > Python > Script parses through a pcap and looks for common SQL inject characteristics

Script parses through a pcap and looks for common SQL inject characteristics

  • 资源大小:6.21 kB
  • 上传时间:2021-06-30
  • 下载次数:0次
  • 浏览次数:0次
  • 资源积分:1积分
  • 标      签:

资 源 简 介

Brief Description Simple python script that parses through a pcap and looks at the GET and POST request data for suspicious and possible SQL injects. Rules to check for SQL injection can be easily added. Output can be printed neatly on the command line or in tab delimited format. The output includes: * The suspicious IP address * The attacked webpage * The parameter and value used * The frame number of the packet within the pcap (can be used to find exactly where the packet is in Wireshark) * The reason why the request was flagged Tool Usage ``` This tool parses through a pcap file and looks for potential SQL injection attempts. usage: sqlinject-finder.py -f filename [-t] Options and arguments (and corresponding environment variables): -f, --filename : valid pcap file -t, --tab : prints output in tab delimited format -h, --help : shows this screen Example: #python sqlinject-finder.py -f capture.pcap #python sqlinject-f
VIP VIP
0.183502s