2012-04-04 16:42:58 +04:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
|
|
|
"""
|
2012-07-12 21:38:03 +04:00
|
|
|
Copyright (c) 2006-2012 sqlmap developers (http://sqlmap.org/)
|
2012-04-04 16:42:58 +04:00
|
|
|
See the file 'doc/COPYING' for copying permission
|
|
|
|
"""
|
|
|
|
|
|
|
|
from lib.core.common import Backend
|
|
|
|
from lib.core.common import randomInt
|
|
|
|
from lib.core.data import conf
|
|
|
|
from lib.core.data import kb
|
|
|
|
from lib.core.data import logger
|
2012-08-21 13:19:15 +04:00
|
|
|
from lib.core.dicts import FROM_DUMMY_TABLE
|
2012-07-30 23:50:46 +04:00
|
|
|
from lib.core.exception import sqlmapNotVulnerableException
|
2012-04-04 16:42:58 +04:00
|
|
|
from lib.techniques.dns.use import dnsUse
|
|
|
|
|
|
|
|
|
|
|
|
def dnsTest(payload):
|
|
|
|
logger.info("testing for data retrieval through DNS channel")
|
|
|
|
|
|
|
|
randInt = randomInt()
|
|
|
|
kb.dnsTest = dnsUse(payload, "SELECT %d%s" % (randInt, FROM_DUMMY_TABLE.get(Backend.getIdentifiedDbms(), ""))) == str(randInt)
|
|
|
|
|
|
|
|
if not kb.dnsTest:
|
2012-07-30 23:50:46 +04:00
|
|
|
errMsg = "data retrieval through DNS channel failed"
|
|
|
|
if not conf.forceDns:
|
|
|
|
conf.dnsName = None
|
|
|
|
errMsg += ". Turning off DNS exfiltration support"
|
|
|
|
logger.error(errMsg)
|
|
|
|
else:
|
|
|
|
raise sqlmapNotVulnerableException, errMsg
|
2012-04-04 16:42:58 +04:00
|
|
|
else:
|
|
|
|
infoMsg = "data retrieval through DNS channel was successful"
|
|
|
|
logger.info(infoMsg)
|