This commit is contained in:
Miroslav Stampar 2019-09-26 10:36:47 +02:00
parent 5168daf6ce
commit d34619232f
2 changed files with 15 additions and 6 deletions

View File

@ -18,7 +18,7 @@ from lib.core.enums import OS
from thirdparty.six import unichr as _unichr from thirdparty.six import unichr as _unichr
# sqlmap version (<major>.<minor>.<month>.<monthly commit>) # sqlmap version (<major>.<minor>.<month>.<monthly commit>)
VERSION = "1.3.9.20" VERSION = "1.3.9.21"
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable" TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34} TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE) VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

View File

@ -16,20 +16,29 @@ def dependencies():
pass pass
def randomIP(): def randomIP():
numbers = [] octets = []
while not numbers or numbers[0] in (10, 172, 192): while not octets or octets[0] in (10, 172, 192):
numbers = random.sample(xrange(1, 255), 4) octets = random.sample(xrange(1, 255), 4)
return '.'.join(str(_) for _ in numbers) return '.'.join(str(_) for _ in octets)
def tamper(payload, **kwargs): def tamper(payload, **kwargs):
""" """
Append a fake HTTP header 'X-Forwarded-For' Append a fake HTTP header 'X-Forwarded-For' (and alike)
""" """
headers = kwargs.get("headers", {}) headers = kwargs.get("headers", {})
headers["X-Forwarded-For"] = randomIP() headers["X-Forwarded-For"] = randomIP()
headers["X-Client-Ip"] = randomIP() headers["X-Client-Ip"] = randomIP()
headers["X-Real-Ip"] = randomIP() headers["X-Real-Ip"] = randomIP()
headers["CF-Connecting-IP"] = randomIP()
headers["True-Client-IP"] = randomIP()
# Reference: https://developer.chrome.com/multidevice/data-compression-for-isps#proxy-connection
headers["Via"] = "1.1 Chrome-Compression-Proxy"
# Reference: https://wordpress.org/support/topic/blocked-country-gaining-access-via-cloudflare/#post-9812007
headers["CF-IPCountry"] = random.sample(('GB', 'US', 'FR', 'AU', 'CA', 'NZ', 'BE', 'DK', 'FI', 'IE', 'AT', 'IT', 'LU', 'NL', 'NO', 'PT', 'SE', 'ES', 'CH'), 1)[0]
return payload return payload