mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 01:26:42 +03:00
adding one more tamper script
This commit is contained in:
parent
03d6031fe7
commit
0d0f2863af
|
@ -22,8 +22,6 @@ __author__ = ('Nicola Larosa <nico-NoSp@m-tekNico.net>,'
|
|||
|
||||
__docformat__ = "restructuredtext en"
|
||||
|
||||
__revision__ = '$Id$'
|
||||
|
||||
__version__ = '0.2.2'
|
||||
|
||||
__all__ = ['OrderedDict', 'SequenceOrderedDict']
|
||||
|
|
28
tamper/appendnullbyte.py
Normal file
28
tamper/appendnullbyte.py
Normal file
|
@ -0,0 +1,28 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
$Id$
|
||||
|
||||
Copyright (c) 2006-2011 sqlmap developers (http://sqlmap.sourceforge.net/)
|
||||
See the file 'doc/COPYING' for copying permission
|
||||
"""
|
||||
|
||||
import string
|
||||
|
||||
from lib.core.enums import PRIORITY
|
||||
|
||||
__priority__ = PRIORITY.LOWEST
|
||||
|
||||
def tamper(payload):
|
||||
"""
|
||||
Appends encoded null byte character at the end of payload
|
||||
Example: "AND 1=1" becomes "AND 1=1%00"
|
||||
Reference: http://projects.webappsec.org/w/page/13246949/Null-Byte-Injection
|
||||
"""
|
||||
|
||||
retVal = payload
|
||||
|
||||
if payload:
|
||||
retVal = "%s%%00" % payload
|
||||
|
||||
return retVal
|
Loading…
Reference in New Issue
Block a user