Skip to content

Latest commit

 

History

History
24 lines (17 loc) · 746 Bytes

README.md

File metadata and controls

24 lines (17 loc) · 746 Bytes

SQL Injection Blind Order-By Data Extractor

Intro

This is a small POC code to extract data from order-by blind SQL injection.
This tool was tested with a server connecting into a PSQL database.

The methods that are used are described here:
https://pulsesecurity.co.nz/articles/postgres-sqli
https://www.onsecurity.io/blog/pentesting-postgresql-with-sql-injections/

You can use the tool to:

  1. Extract data from the DB using side channel attack (time based)
  2. Extract OS files from DB
  3. Write files to the DB

Usage

  1. Update the config.json file with the necessary details, look at the code from more options
  2. Run

    pip install -r requirements.txt

  3. To start the data extraction, run:

    python extract_data.py