Valid values: 1: Always (<100 requests) 2: Try a bit harder (100-200 requests) 3: Good number of requests (200-500 requests) 4: Extensive test (500-1000 requests) 5: You have plenty of time (>1000 requests)
<risk> Likelihood of a payload to damage the data integrity.
Valid values: 1: Low risk 2: Medium risk 3: High risk
Sub-tag: <level> From which level check for this test.
Valid values: 1: Always (<100 requests) 2: Try a bit harder (100-200 requests) 3: Good number of requests (200-500 requests) 4: Extensive test (500-1000 requests) 5: You have plenty of time (>1000 requests)
Sub-tag: <risk> Likelihood of a payload to damage the data integrity.
Valid values: 1: Low risk 2: Medium risk 3: High risk
Sub-tag: <clause> In which clause the payload can work.
NOTE: for instance, there are some payload that do not have tobe tested as soon as it has been identified whether or not the injection is within a WHERE clause condition.
Valid values: 0: Always 1: WHERE / HAVING 2: GROUP BY 3: ORDER BY 4: LIMIT 5: OFFSET 6: TOP 7: Table name 8: Column name 9: Pre-WHERE (non-query)
A comma separated list of these valuesis also possible.
Sub-tag: <where> Where toadd our '<prefix> <payload><comment> <suffix>'string.
Valid values: 1: Append the stringto the parameter original value 2: Replace the parameter original value with a negative random integer value andappend our string 3: Replace the parameter original value with our string
解释时间: 1. **1: Append the stringto the parameter original value**
- 这意味着你需要将测试字符串附加到现有的参数值之后。例如,如果原始参数值是 `123`,并且你的测试字符串是 `XYZ`,那么修改后的参数值将是 `123XYZ`。 2. **2: Replace the parameter original value with a negative random integer value andappend our string**
- 这里指的是首先用一个随机的负整数替换原始参数值,然后再附加测试字符串。例如,如果原始参数是 `123`,你选择了 `-456` 作为随机负整数,测试字符串是 `XYZ`,那么最终的参数值将是 `-456XYZ`。 3. **3: Replace the parameter original value with our string**
Sub-tag: <vector> The payload that will be used to exploit the injection point.
Sub-tag: <request> What to inject for this test.
Sub-tag: <payload> The payload to test for.
Sub-tag: <comment> Comment toappendto the payload, before the suffix.
Sub-tag: <char> Character to use to bruteforce number of columns in UNION query SQL injection tests.
Sub-tag: <columns> Range of columns to test for in UNION query SQL injection tests.
Sub-tag: <response> How to identify if the injected payload succeeded.
Sub-tag: <comparison> Perform a request with this stringas the payload and compare the response with the <payload> response. Apply the comparison algorithm.
NOTE: useful to test for boolean-based blind SQL injections.
此 tag 用于对比实验
Sub-tag: <grep> Regular expression togrepfor in the response body.
NOTE: useful to test for error-based SQL injection.
Sub-tag: <time> Time in seconds to wait before the response is returned.
NOTE: useful to test for time-based blind and stacked queries SQL injections.
Sub-tag: <union> Calls unionTest() function.
NOTE: useful to test for UNION query (inband) SQL injection.
Sub-tag: <details> Which details can be infered if the payload succeed.
Sub-tags: <dbms> What is the database management system (e.g. MySQL).
Sub-tags: <dbms_version> What is the database management systemversion (e.g. 5.0.51).
Sub-tags: <os> What is the database management system underlying operating system.