sqlmap/lib/techniques/dns/test.py

34 lines
1.1 KiB
Python
Raw Normal View History

2019-05-08 13:47:52 +03:00
#!/usr/bin/env python
2012-04-04 16:42:58 +04:00
"""
2024-01-04 01:11:52 +03:00
Copyright (c) 2006-2024 sqlmap developers (https://sqlmap.org/)
2017-10-11 15:50:46 +03:00
See the file 'LICENSE' for copying permission
2012-04-04 16:42:58 +04:00
"""
from lib.core.common import Backend
from lib.core.common import randomInt
from lib.core.data import conf
from lib.core.data import kb
from lib.core.data import logger
2012-08-21 13:19:15 +04:00
from lib.core.dicts import FROM_DUMMY_TABLE
from lib.core.exception import SqlmapNotVulnerableException
2012-04-04 16:42:58 +04:00
from lib.techniques.dns.use import dnsUse
def dnsTest(payload):
logger.info("testing for data retrieval through DNS channel")
randInt = randomInt()
kb.dnsTest = dnsUse(payload, "SELECT %d%s" % (randInt, FROM_DUMMY_TABLE.get(Backend.getIdentifiedDbms(), ""))) == str(randInt)
if not kb.dnsTest:
2012-07-30 23:50:46 +04:00
errMsg = "data retrieval through DNS channel failed"
if not conf.forceDns:
2016-10-22 22:52:18 +03:00
conf.dnsDomain = None
2012-07-30 23:50:46 +04:00
errMsg += ". Turning off DNS exfiltration support"
logger.error(errMsg)
else:
raise SqlmapNotVulnerableException(errMsg)
2012-04-04 16:42:58 +04:00
else:
infoMsg = "data retrieval through DNS channel was successful"
logger.info(infoMsg)