Esempio n. 1
0
def fuzzTest():
    count = 0
    address, port = "127.0.0.10", random.randint(1025, 65535)

    def _thread():
        vulnserver.init(quiet=True)
        vulnserver.run(address=address, port=port)

    thread = threading.Thread(target=_thread)
    thread.daemon = True
    thread.start()

    while True:
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        try:
            s.connect((address, port))
            break
        except:
            time.sleep(1)

    handle, config = tempfile.mkstemp(suffix=".conf")
    os.close(handle)

    url = "http://%s:%d/?id=1" % (address, port)

    content = open(os.path.abspath(os.path.join(os.path.dirname(__file__), "..", "..", "sqlmap.conf"))).read().replace("url =", "url = %s" % url)
    open(config, "w+").write(content)

    while True:
        lines = content.split("\n")

        for i in xrange(20):
            j = random.randint(0, len(lines) - 1)

            if any(_ in lines[j] for _ in ("googleDork",)):
                continue

            if lines[j].strip().endswith('='):
                lines[j] += random.sample(("True", "False", randomStr(), str(randomInt())), 1)[0]

            k = random.randint(0, len(lines) - 1)
            if '=' in lines[k]:
                lines[k] += chr(random.randint(0, 255))

        open(config, "w+").write("\n".join(lines))

        cmd = "%s %s -c %s --non-interactive --answers='Github=n' --flush-session --technique=%s --banner" % (sys.executable, os.path.abspath(os.path.join(os.path.dirname(__file__), "..", "..", "sqlmap.py")), config, random.sample("BEUQ", 1)[0])
        output = shellExec(cmd)

        if "Traceback" in output:
            dataToStdout("---\n\n$ %s\n" % cmd)
            dataToStdout("%s---\n" % output, coloring=False)

            handle, config = tempfile.mkstemp(prefix="sqlmapcrash", suffix=".conf")
            os.close(handle)
            open(config, "w+").write("\n".join(lines))
        else:
            dataToStdout("\r%d\r" % count)

        count += 1
Esempio n. 2
0
def vulnTest():
    """
    Runs the testing against 'vulnserver'
    """

    retVal = True
    count, length = 0, 6
    address, port = "127.0.0.10", random.randint(1025, 65535)

    def _thread():
        vulnserver.init(quiet=True)
        vulnserver.run(address=address, port=port)

    thread = threading.Thread(target=_thread)
    thread.daemon = True
    thread.start()

    for options, checks in (
        ("--flush-session --identify-waf", ("CloudFlare", )),
        ("--flush-session --parse-errors",
         (": syntax error", "Type: boolean-based blind",
          "Type: time-based blind", "Type: UNION query",
          "back-end DBMS: SQLite", "3 columns")),
        ("--banner --schema --dump -T users --binary-fields=surname --where 'id>3'",
         ("banner: '3", "INTEGER", "TEXT", "id", "name", "surname",
          "2 entries", "6E616D6569736E756C6C")),
        ("--all --tamper=between,randomcase",
         ("5 entries", "luther", "blisset", "fluffy",
          "179ad45c6ce2cb97cf1029e212046e81", "NULL", "nameisnull",
          "testpass")),
        ("--technique=B --hex --fresh-queries --threads=4 --sql-query='SELECT 987654321'",
         (
             "length of query output",
             ": '987654321'",
         )),
        ("--technique=T --fresh-queries --sql-query='SELECT 1234'",
         (": '1234'", )),
    ):
        output = shellExec("%s %s -u http://%s:%d/?id=1 --batch %s" %
                           (sys.executable,
                            os.path.join(os.path.dirname(__file__), "..", "..",
                                         "sqlmap.py"), address, port, options))
        output = getUnicode(output)

        if not all(check in output for check in checks):
            retVal = False

        count += 1
        status = '%d/%d (%d%%) ' % (count, length, round(
            100.0 * count / length))
        dataToStdout("\r[%s] [INFO] complete: %s" %
                     (time.strftime("%X"), status))

    clearConsoleLine()
    if retVal:
        logger.info("vuln test final result: PASSED")
    else:
        logger.error("vuln test final result: FAILED")

    return retVal
Esempio n. 3
0
def vulnTest():
    """
    Runs the testing against 'vulnserver'
    """

    retVal = True
    count, length = 0, 6

    def _thread():
        vulnserver.init(quiet=True)
        vulnserver.run()

    thread = threading.Thread(target=_thread)
    thread.daemon = True
    thread.start()

    for options, checks in (
        ("--version", ("1.", "#")),
        ("--flush-session",
         ("Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "back-end DBMS: SQLite", "3 columns")),
        ("--banner --schema --dump -T users --binary-fields=surname --where 'id>3'",
         ("banner: '3", "INTEGER", "TEXT", "id", "name", "surname",
          "2 entries", "6E616D6569736E756C6C")),
        ("--all", ("5 entries", "luther", "blisset", "fluffy", "ming", "NULL",
                   "nameisnull")),
        ("--technique=B --hex --fresh-queries --sql-query='SELECT 987654321'",
         (
             "single-thread",
             ": '987654321'",
         )),
        ("--technique=T --fresh-queries --sql-query='SELECT 987654321'",
         (": '987654321'", )),
    ):
        output = shellExec(
            "python sqlmap.py -u http://%s:%d/?id=1 --batch %s" %
            (vulnserver.LISTEN_ADDRESS, vulnserver.LISTEN_PORT, options))
        if not all(check in output for check in checks):
            retVal = False

        count += 1
        status = '%d/%d (%d%%) ' % (count, length, round(
            100.0 * count / length))
        dataToStdout("\r[%s] [INFO] complete: %s" %
                     (time.strftime("%X"), status))

    clearConsoleLine()
    if retVal:
        logger.info("vuln test final result: PASSED")
    else:
        logger.error("vuln test final result: FAILED")

    return retVal
Esempio n. 4
0
def vulnTest():
    """
    Runs the testing against 'vulnserver'
    """

    retVal = True
    count, length = 0, 6

    def _thread():
        vulnserver.init(quiet=True)
        vulnserver.run()

    thread = threading.Thread(target=_thread)
    thread.daemon = True
    thread.start()

    for options, checks in (
        ("--version", ("1.", "#")),
        ("--flush-session", ("Type: boolean-based blind", "Type: time-based blind", "Type: UNION query", "back-end DBMS: SQLite", "3 columns")),
        ("--banner --schema --dump -T users --binary-fields=surname --where 'id>3'", ("banner: '3", "INTEGER", "TEXT", "id", "name", "surname", "2 entries", "6E616D6569736E756C6C")),
        ("--all", ("5 entries", "luther", "blisset", "fluffy", "ming", "NULL", "nameisnull")),
        ("--technique=B --hex --fresh-queries --sql-query='SELECT 987654321'", ("single-thread", ": '987654321'",)),
        ("--technique=T --fresh-queries --sql-query='SELECT 987654321'", (": '987654321'",)),
    ):
        output = shellExec("python sqlmap.py -u http://%s:%d/?id=1 --batch %s" % (vulnserver.LISTEN_ADDRESS, vulnserver.LISTEN_PORT, options))
        if not all(check in output for check in checks):
            retVal = False

        count += 1
        status = '%d/%d (%d%%) ' % (count, length, round(100.0 * count / length))
        dataToStdout("\r[%s] [INFO] complete: %s" % (time.strftime("%X"), status))

    clearConsoleLine()
    if retVal:
        logger.info("vuln test final result: PASSED")
    else:
        logger.error("vuln test final result: FAILED")

    return retVal
Esempio n. 5
0
def vulnTest():
    """
    Runs the testing against 'vulnserver'
    """

    TESTS = (
        ("-r <request> --flush-session", ("CloudFlare", )),
        ("-u <url> --flush-session --encoding=ascii --forms --crawl=2 --banner",
         ("total of 2 targets", "might be injectable", "Type: UNION query",
          "banner: '3")),
        ("-u <url> --flush-session --data='{\"id\": 1}' --banner",
         ("might be injectable", "3 columns", "Payload: {\"id\"",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "banner: '3")),
        ("-u <url> --flush-session --data='<root><param name=\"id\" value=\"1*\"/></root>' --union-char=1 --mobile --banner --smart",
         ("might be injectable", "Payload: <root><param name=\"id\" value=\"1",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "banner: '3")),
        ("-u <url> --flush-session --method=PUT --data='a=1&b=2&c=3&id=1' --skip-static --dump -T users --start=1 --stop=2",
         ("might be injectable", "Parameter: id (PUT)",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "2 entries")),
        ("-u <url> --flush-session -H 'id: 1*' --tables",
         ("might be injectable", "Parameter: id #1* ((custom) HEADER)",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", " users ")),
        ("-u <url> --flush-session --banner --invalid-logical --technique=B --test-filter='OR boolean' --tamper=space2dash",
         ("banner: '3", " LIKE ")),
        ("-u <url> --flush-session --cookie=\"PHPSESSID=d41d8cd98f00b204e9800998ecf8427e; id=1*; id2=2\" --tables --union-cols=3",
         ("might be injectable", "Cookie #1* ((custom) HEADER)",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", " users ")),
        ("-u <url> --flush-session --null-connection --technique=B --tamper=between,randomcase --banner",
         ("NULL connection is supported with HEAD method", "banner: '3")),
        ("-u <url> --flush-session --parse-errors --test-filter=\"subquery\" --eval=\"import hashlib; id2=2; id3=hashlib.md5(id.encode()).hexdigest()\" --referer=\"localhost\"",
         ("might be injectable", ": syntax error", "back-end DBMS: SQLite",
          "WHERE or HAVING clause (subquery")),
        ("-u <url> --banner --schema --dump -T users --binary-fields=surname --where \"id>3\"",
         ("banner: '3", "INTEGER", "TEXT", "id", "name", "surname",
          "2 entries", "6E616D6569736E756C6C")),
        ("-u <url> --flush-session --all",
         ("5 entries", "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "luther", "blisset", "fluffy",
          "179ad45c6ce2cb97cf1029e212046e81", "NULL", "nameisnull",
          "testpass")),
        ("-u <url> -z \"tec=B\" --hex --fresh-queries --threads=4 --sql-query=\"SELECT * FROM users\"",
         ("SELECT * FROM users [5]", "nameisnull")),
        ("-u '<url>&echo=foobar*' --flush-session",
         ("might be vulnerable to cross-site scripting", )),
        ("-u '<url>&query=*' --flush-session --technique=Q --banner",
         ("Title: SQLite inline queries", "banner: '3")),
        ("-d <direct> --flush-session --dump -T users --binary-fields=name --where \"id=3\"",
         (
             "7775",
             "179ad45c6ce2cb97cf1029e212046e81 (testpass)",
         )),
        ("-d <direct> --flush-session --banner --schema --sql-query=\"SELECT 987654321\"",
         (
             "banner: '3",
             "INTEGER",
             "TEXT",
             "id",
             "name",
             "surname",
             "[*] 987654321",
         )),
    )

    retVal = True
    count = 0
    address, port = "127.0.0.10", random.randint(1025, 65535)

    def _thread():
        vulnserver.init(quiet=True)
        vulnserver.run(address=address, port=port)

    thread = threading.Thread(target=_thread)
    thread.daemon = True
    thread.start()

    while True:
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        try:
            s.connect((address, port))
            break
        except:
            time.sleep(1)

    handle, database = tempfile.mkstemp(suffix=".sqlite")
    os.close(handle)

    with sqlite3.connect(database) as conn:
        c = conn.cursor()
        c.executescript(vulnserver.SCHEMA)

    handle, request = tempfile.mkstemp(suffix=".req")
    os.close(handle)

    open(request, "w+").write("POST / HTTP/1.0\nHost: %s:%s\n\nid=1\n" %
                              (address, port))

    url = "http://%s:%d/?id=1" % (address, port)
    direct = "sqlite3://%s" % database

    for options, checks in TESTS:
        status = '%d/%d (%d%%) ' % (count, len(TESTS),
                                    round(100.0 * count / len(TESTS)))
        dataToStdout("\r[%s] [INFO] complete: %s" %
                     (time.strftime("%X"), status))

        cmd = "%s %s %s --batch" % (sys.executable,
                                    os.path.abspath(
                                        os.path.join(os.path.dirname(__file__),
                                                     "..", "..", "sqlmap.py")),
                                    options.replace("<url>", url).replace(
                                        "<direct>", direct).replace(
                                            "<request>", request))
        output = shellExec(cmd)

        if not all(check in output for check in checks):
            dataToStdout("---\n\n$ %s\n" % cmd)
            dataToStdout("%s---\n" % clearColors(output))
            retVal = False

        count += 1

    clearConsoleLine()
    if retVal:
        logger.info("vuln test final result: PASSED")
    else:
        logger.error("vuln test final result: FAILED")

    return retVal
Esempio n. 6
0
def vulnTest():
    """
    Runs the testing against 'vulnserver'
    """

    TESTS = (
        ("-h", ("to see full list of options run with '-hh'", )),
        ("-u <url> --flush-session --wizard --check-internet",
         ("Please choose:", "back-end DBMS: SQLite",
          "current user is DBA: True", "banner: '3.",
          "~no connection detected")),
        (u"-c <config> --flush-session --sql-query=\"SELECT '\u0161u\u0107uraj'\" --technique=U",
         (u": '\u0161u\u0107uraj'", )),
        (u"-u <url> --flush-session --sql-query=\"SELECT '\u0161u\u0107uraj'\" --technique=B --no-escape --string=luther --unstable",
         (u": '\u0161u\u0107uraj'", )),
        ("--dummy", ("all tested parameters do not appear to be injectable",
                     "does not seem to be injectable",
                     "there is not at least one", "~might be injectable")),
        ("--list-tampers", ("between", "MySQL", "xforwardedfor")),
        ("-r <request> --flush-session -v 5",
         ("CloudFlare", "possible DBMS: 'SQLite'", "User-agent: foobar")),
        ("-l <log> --flush-session --keep-alive --skip-waf -v 5 --technique=U --union-from=users --banner --parse-errors",
         ("banner: '3.", "ORDER BY term out of range", "~xp_cmdshell",
          "Connection: keep-alive")),
        ("-l <log> --offline --banner -v 5", ("banner: '3.",
                                              "~[TRAFFIC OUT]")),
        ("-u <url> --flush-session --encoding=ascii --forms --crawl=2 --threads=2 --banner",
         ("total of 2 targets", "might be injectable", "Type: UNION query",
          "banner: '3.")),
        ("-u <url> --flush-session --data='{\"id\": 1}' --banner",
         ("might be injectable", "3 columns", "Payload: {\"id\"",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "banner: '3.")),
        ("-u <url> --flush-session -H 'Foo: Bar' -H 'Sna: Fu' --data='<root><param name=\"id\" value=\"1*\"/></root>' --union-char=1 --mobile --answers='smartphone=3' --banner --smart -v 5",
         ("might be injectable", "Payload: <root><param name=\"id\" value=\"1",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "banner: '3.", "Nexus", "Sna: Fu", "Foo: Bar")),
        ("-u <url> --flush-session --method=PUT --data='a=1&b=2&c=3&id=1' --skip-static --dump -T users --start=1 --stop=2",
         ("might be injectable", "Parameter: id (PUT)",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "2 entries")),
        ("-u <url> --flush-session -H 'id: 1*' --tables",
         ("might be injectable", "Parameter: id #1* ((custom) HEADER)",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", " users ")),
        ("-u <url> --flush-session --banner --invalid-logical --technique=B --predict-output --test-filter='OR boolean' --tamper=space2dash",
         ("banner: '3.", " LIKE ")),
        ("-u <url> --flush-session --cookie=\"PHPSESSID=d41d8cd98f00b204e9800998ecf8427e; id=1*; id2=2\" --tables --union-cols=3",
         ("might be injectable", "Cookie #1* ((custom) HEADER)",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", " users ")),
        ("-u <url> --flush-session --null-connection --technique=B --tamper=between,randomcase --banner",
         ("NULL connection is supported with HEAD method", "banner: '3.")),
        ("-u <url> --flush-session --parse-errors --test-filter=\"subquery\" --eval=\"import hashlib; id2=2; id3=hashlib.md5(id.encode()).hexdigest()\" --referer=\"localhost\"",
         ("might be injectable", ": syntax error", "back-end DBMS: SQLite",
          "WHERE or HAVING clause (subquery")),
        ("-u <url> --banner --schema --dump -T users --binary-fields=surname --where \"id>3\"",
         ("banner: '3.", "INTEGER", "TEXT", "id", "name", "surname",
          "2 entries", "6E616D6569736E756C6C")),
        ("-u <url> --technique=U --fresh-queries --force-partial --dump -T users --dump-format=HTML --answers=\"crack=n\" -v 3",
         ("performed 6 queries", "nameisnull", "~using default dictionary",
          "dumped to HTML file")),
        ("-u <url> --flush-session --all",
         ("5 entries", "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "luther", "blisset", "fluffy",
          "179ad45c6ce2cb97cf1029e212046e81", "NULL", "nameisnull",
          "testpass")),
        ("-u <url> -z \"tec=B\" --hex --fresh-queries --threads=4 --sql-query=\"SELECT * FROM users\"",
         ("SELECT * FROM users [5]", "nameisnull")),
        ("-u '<url>&echo=foobar*' --flush-session",
         ("might be vulnerable to cross-site scripting", )),
        ("-u '<url>&query=*' --flush-session --technique=Q --banner",
         ("Title: SQLite inline queries", "banner: '3.")),
        ("-d <direct> --flush-session --dump -T users --dump-format=SQLITE --binary-fields=name --where \"id=3\"",
         ("7775", "179ad45c6ce2cb97cf1029e212046e81 (testpass)",
          "dumped to SQLITE database")),
        ("-d <direct> --flush-session --banner --schema --sql-query=\"UPDATE users SET name='foobar' WHERE id=5; SELECT * FROM users; SELECT 987654321\"",
         (
             "banner: '3.",
             "INTEGER",
             "TEXT",
             "id",
             "name",
             "surname",
             "5, foobar, nameisnull",
             "[*] 987654321",
         )),
        ("--purge -v 3", ("~ERROR", "~CRITICAL",
                          "deleting the whole directory tree")),
    )

    retVal = True
    count = 0
    address, port = "127.0.0.10", random.randint(1025, 65535)

    def _thread():
        vulnserver.init(quiet=True)
        vulnserver.run(address=address, port=port)

    thread = threading.Thread(target=_thread)
    thread.daemon = True
    thread.start()

    while True:
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        try:
            s.connect((address, port))
            break
        except:
            time.sleep(1)

    handle, config = tempfile.mkstemp(suffix=".conf")
    os.close(handle)

    handle, database = tempfile.mkstemp(suffix=".sqlite")
    os.close(handle)

    with sqlite3.connect(database) as conn:
        c = conn.cursor()
        c.executescript(vulnserver.SCHEMA)

    handle, request = tempfile.mkstemp(suffix=".req")
    os.close(handle)

    handle, log = tempfile.mkstemp(suffix=".log")
    os.close(handle)

    content = "POST / HTTP/1.0\nUser-agent: foobar\nHost: %s:%s\n\nid=1\n" % (
        address, port)

    open(request, "w+").write(content)
    open(log, "w+").write(
        '<port>%d</port><request base64="true"><![CDATA[%s]]></request>' %
        (port, encodeBase64(content, binary=False)))

    url = "http://%s:%d/?id=1" % (address, port)
    direct = "sqlite3://%s" % database

    content = open(
        os.path.abspath(
            os.path.join(os.path.dirname(__file__), "..", "..",
                         "sqlmap.conf"))).read().replace(
                             "url =", "url = %s" % url)
    open(config, "w+").write(content)

    for options, checks in TESTS:
        status = '%d/%d (%d%%) ' % (count, len(TESTS),
                                    round(100.0 * count / len(TESTS)))
        dataToStdout("\r[%s] [INFO] complete: %s" %
                     (time.strftime("%X"), status))

        cmd = "%s %s %s --batch" % (
            sys.executable,
            os.path.abspath(
                os.path.join(os.path.dirname(__file__),
                             "..", "..", "sqlmap.py")),
            options.replace("<url>", url).replace("<direct>", direct).replace(
                "<request>", request).replace("<log>", log).replace(
                    "<config>", config))
        output = shellExec(cmd)

        if not all(
            (check in output if not check.startswith('~') else check[1:] not in
             output) for check in checks):
            dataToStdout("---\n\n$ %s\n" % cmd)
            dataToStdout("%s---\n" % clearColors(output))
            retVal = False

        count += 1

    clearConsoleLine()
    if retVal:
        logger.info("vuln test final result: PASSED")
    else:
        logger.error("vuln test final result: FAILED")

    return retVal
Esempio n. 7
0
def bedTest():
    """
    Runs the testing against 'testbed'
    """

    TESTS = (
        # Firebird
        ("-u 'http://testbed/firebird/get_int.php?id=1' --flush-session --technique=B --is-dba --threads=4 --dump --banner --sql-query=\"SELECT 'foobar'\"",
         ("banner: '2.5", "Table: USERS", "5 entries", "ID", "NAME", "SURNAME",
          "luther", "blisset", "NULL", "Payload: id=1 AND ",
          "possible DBMS: 'Firebird'", "the back-end DBMS is Firebird",
          "current user is DBA: True", ": 'foobar'")),
        ("-u 'http://testbed/firebird/get_int.php?id=1' --flush-session --technique=U --is-dba --dump --banner --sql-query=\"SELECT 'foobar'\"",
         ("banner: '2.5", "Table: USERS", "5 entries", "ID", "NAME", "SURNAME",
          "luther", "blisset", "NULL",
          "Title: Generic UNION query (NULL) - 3 columns",
          "the back-end DBMS is Firebird", "appears to have 3 columns",
          "current user is DBA: True", ": 'foobar'")),
        ("-u 'http://testbed/firebird/get_int.php?id=1' --flush-session --technique=U --hex --banner --current-user --search -C surname --answers='dump=n'",
         ("banner: '2.5", "current user: '******'", "[1 column]",
          "| SURNAME | VARCHAR |")),

        # Altibase
        ("-u 'http://testbed/altibase/get_int.php?id=1' --flush-session --technique=B --is-dba --threads=4 --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("x86_64-unknown-linux-gnu", "Database: SYS", "Table: TESTUSERS",
          "5 entries", "ID", "NAME", "SURNAME", "luther", "blisset", "NULL",
          "Payload: id=1 AND ", "back-end DBMS could be 'Altibase'",
          "the back-end DBMS is Altibase", "current user is DBA: True",
          ": 'foobar'")),
        ("-u 'http://testbed/altibase/get_int.php?id=1' --flush-session --technique=U --is-dba --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("x86_64-unknown-linux-gnu", "Database: SYS", "Table: TESTUSERS",
          "5 entries", "ID", "NAME", "SURNAME", "luther", "blisset", "NULL",
          "Title: Generic UNION query (NULL) - 3 columns",
          "the back-end DBMS is Altibase", "appears to have 3 columns",
          "current user is DBA: True", ": 'foobar'")),
        ("-u 'http://testbed/altibase/get_int.php?id=1' --flush-session --technique=U --hex --banner --current-user --current-db --search -C surname --answers='dump=n'",
         ("x86_64-unknown-linux-gnu",
          "current user (equivalent to database on Altibase): 'SYS'",
          "current user: '******'", "[1 column]", "| SURNAME | VARCHAR |")),

        # CockroachDB
        ("-u 'http://testbed/cockroachdb/get_int.php?id=1' --flush-session --technique=B --is-dba --threads=4 --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("x86_64-unknown-linux-gnu", "CockroachDB fork", "Database: public",
          "Table: testusers", "5 entries", "id", "name", "surname", "luther",
          "blisset", "NULL", "Payload: id=1 AND ",
          "back-end DBMS could be 'PostgreSQL'",
          "the back-end DBMS is PostgreSQL", "current user is DBA: True",
          ": 'foobar'")),
        ("-u 'http://testbed/cockroachdb/get_int.php?id=1' --flush-session --technique=U --is-dba --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("x86_64-unknown-linux-gnu", "CockroachDB fork", "Database: public",
          "Table: testusers", "5 entries", "id", "name", "surname", "luther",
          "blisset", "NULL", "Title: Generic UNION query (NULL) - 3 columns",
          "the back-end DBMS is PostgreSQL", "appears to have 3 columns",
          "current user is DBA: True", ": 'foobar'")),
        ("-u 'http://testbed/cockroachdb/get_int.php?id=1' --flush-session --technique=E --is-dba --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("x86_64-unknown-linux-gnu", "CockroachDB fork", "Database: public",
          "Table: testusers", "5 entries", "id", "name", "surname", "luther",
          "blisset", "NULL", "Title: PostgreSQL AND error-based",
          "the back-end DBMS is PostgreSQL", "current user is DBA: True",
          ": 'foobar'")),
        ("-u 'http://testbed/cockroachdb/get_int.php?id=1' --flush-session --hex --banner --current-user --current-db --search -C surname --answers='dump=n'",
         ("Title: AND boolean-based blind",
          "Title: PostgreSQL AND error-based",
          "Title: PostgreSQL > 8.1 stacked queries",
          "Title: PostgreSQL > 8.1 AND time-based blind",
          "Title: Generic UNION query (NULL) - 3 columns",
          "x86_64-unknown-linux-gnu",
          "current schema (equivalent to database on PostgreSQL): 'public'",
          "current user: '******'", "[1 column]", "| surname | varchar |")),

        # CrateDB
        ("-u 'http://testbed/cratedb/get_int.php?id=1' --flush-session --technique=B --is-dba --threads=4 --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("4.0.10", "Database: doc", "Table: testusers", "5 entries", "id",
          "name", "surname", "luther", "blisset", "NULL", "Payload: id=1 AND ",
          "back-end DBMS could be 'CrateDB'", "the back-end DBMS is CrateDB",
          "current user is DBA: True", ": 'foobar'")),
        ("-u 'http://testbed/cratedb/get_int.php?id=1' --flush-session --technique=B --hex --banner --current-user --current-db --search -C surname --answers='dump=n'",
         ("4.0.10",
          "current schema (equivalent to database on CrateDB): 'doc'",
          "current user: '******'", "[1 column]", "| surname |")),

        # Drizzle
        ("-u 'http://testbed/drizzle/get_int.php?id=1' --flush-session --technique=B --is-dba --threads=4 --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("7.1.36-stable", "Drizzle fork", "Database: testdb",
          "Table: testusers", "5 entries", "id", "name", "surname", "luther",
          "blisset", "NULL", "Payload: id=1 AND ",
          "it looks like the back-end DBMS is 'MySQL'",
          "the back-end DBMS is MySQL", "current user is DBA: True",
          ": 'foobar'")),
        ("-u 'http://testbed/drizzle/get_int.php?id=1' --flush-session --technique=U --is-dba --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("7.1.36-stable", "Drizzle fork", "Database: testdb",
          "Table: testusers", "5 entries", "id", "name", "surname", "luther",
          "blisset", "NULL", "Title: Generic UNION query (NULL) - 3 columns",
          "the back-end DBMS is MySQL", "appears to have 3 columns",
          "current user is DBA: True", ": 'foobar'")),
        ("-u 'http://testbed/drizzle/get_int.php?id=1' --flush-session --hex --banner --current-user --current-db --search -C surname --answers='dump=n'",
         ("Title: AND boolean-based blind",
          "Title: MySQL >= 5.0.12 AND time-based blind",
          "Title: Generic UNION query (NULL) - 3 columns", "7.1.36-stable",
          "current database: 'testdb'", "current user: '******'", "[1 column]",
          "| surname | VARCHAR |")),

        # IBM DB2
        ("-u 'http://testbed/db2/get_int.php?id=1' --flush-session --technique=B --is-dba --threads=4 --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("banner: 'DB2 v", "Database: DB2INST1", "Table: USERS", "5 entries",
          "ID", "NAME", "SURNAME", "luther", "blisset", "NULL",
          "Payload: id=1 AND ", "it looks like the back-end DBMS is 'IBM DB2'",
          "the back-end DBMS is IBM DB2", "current user is DBA: True",
          ": 'foobar'")),
        ("-u 'http://testbed/db2/get_int.php?id=1' --flush-session --technique=U --is-dba --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("banner: 'DB2 v", "Database: DB2INST1", "Table: USERS", "5 entries",
          "ID", "NAME", "SURNAME", "luther", "blisset", "NULL",
          "Title: Generic UNION query (NULL) - 3 columns",
          "the back-end DBMS is IBM DB2", "appears to have 3 columns",
          "current user is DBA: True", ": 'foobar'")),
        ("-u 'http://testbed/db2/get_int.php?id=1' --flush-session --technique=U --hex --banner --current-user --current-db --search -C surname --answers='dump=n'",
         ("banner: 'DB2 v",
          "current user (equivalent to database on IBM DB2): 'DB2INST1'",
          "current user: '******'", "[1 column]",
          "| SURNAME | VARCHAR(1000) |")),

        # MariaDB
        ("-u 'http://testbed/mariadb/get_int.php?id=1' --flush-session --technique=B --is-dba --threads=4 --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("10.4.12-MariaDB-1:10.4.12+maria~bionic", "MariaDB fork",
          "Database: testdb", "Table: testusers", "5 entries", "id", "name",
          "surname", "luther", "blisset", "NULL", "Payload: id=1 AND ",
          "it looks like the back-end DBMS is 'MySQL'",
          "the back-end DBMS is MySQL", "current user is DBA: True",
          ": 'foobar'")),
        ("-u 'http://testbed/mariadb/get_int.php?id=1' --flush-session --technique=U --is-dba --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("10.4.12-MariaDB-1:10.4.12+maria~bionic", "MariaDB fork",
          "Database: testdb", "Table: testusers", "5 entries", "id", "name",
          "surname", "luther", "blisset", "NULL",
          "Title: Generic UNION query (NULL) - 3 columns",
          "the back-end DBMS is MySQL", "appears to have 3 columns",
          "current user is DBA: True", ": 'foobar'")),
        ("-u 'http://testbed/mariadb/get_int.php?id=1' --flush-session --technique=E --is-dba --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("10.4.12-MariaDB-1:10.4.12+maria~bionic", "MariaDB fork",
          "Database: testdb", "Table: testusers", "5 entries", "id", "name",
          "surname", "luther", "blisset", "NULL",
          "Title: MySQL >= 5.0 AND error-based", "the back-end DBMS is MySQL",
          "current user is DBA: True", ": 'foobar'")),
        ("-u 'http://testbed/mariadb/get_int.php?id=1' --flush-session --hex --banner --current-user --current-db --search -C surname --answers='dump=n'",
         ("Title: AND boolean-based blind",
          "Title: MySQL >= 5.0 AND error-based",
          "Title: MySQL >= 5.0.12 AND time-based blind",
          "Title: Generic UNION query (NULL) - 3 columns",
          "10.4.12-MariaDB-1:10.4.12+maria~bionic",
          "current database: 'testdb'", "current user: '******'", "[1 column]",
          "| surname | varchar(1000) |")),

        # MySQL
        ("-u 'http://testbed/mysql/get_int.php?id=1' --flush-session --technique=B --is-dba --threads=4 --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("8.0.19", "Database: testdb", "Table: testusers", "5 entries", "id",
          "name", "surname", "luther", "blisset", "NULL", "Payload: id=1 AND ",
          "it looks like the back-end DBMS is 'MySQL'",
          "the back-end DBMS is MySQL", "current user is DBA: True",
          ": 'foobar'")),
        ("-u 'http://testbed/mysql/get_int.php?id=1' --flush-session --technique=U --is-dba --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("8.0.19", "Database: testdb", "Table: testusers", "5 entries", "id",
          "name", "surname", "luther", "blisset", "NULL",
          "Title: Generic UNION query (NULL) - 3 columns",
          "the back-end DBMS is MySQL", "appears to have 3 columns",
          "current user is DBA: True", ": 'foobar'")),
        ("-u 'http://testbed/mysql/get_int.php?id=1' --flush-session --technique=E --is-dba --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("8.0.19", "Database: testdb", "Table: testusers", "5 entries", "id",
          "name", "surname", "luther", "blisset", "NULL",
          "Title: MySQL >= 5.0 AND error-based", "the back-end DBMS is MySQL",
          "appears to have 3 columns", "current user is DBA: True",
          ": 'foobar'")),
        ("-u 'http://testbed/mysql/get_int.php?id=1' --flush-session --hex --banner --current-user --current-db --search -C surname --answers='dump=n'",
         ("Title: AND boolean-based blind",
          "Title: MySQL >= 5.1 AND error-based",
          "Title: MySQL >= 5.0.12 AND time-based blind",
          "Title: Generic UNION query (NULL) - 3 columns", "8.0.19",
          "current database: 'testdb'", "current user: '******'", "[1 column]",
          "| surname | varchar(1000) |")),

        # PostgreSQL
        ("-u 'http://testbed/postgresql/get_int.php?id=1' --flush-session --technique=B --is-dba --threads=4 --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("x86_64-pc-linux-gnu", "Database: public", "Table: testusers",
          "5 entries", "id", "name", "surname", "luther", "blisset", "NULL",
          "Payload: id=1 AND ",
          "it looks like the back-end DBMS is 'PostgreSQL'",
          "the back-end DBMS is PostgreSQL", "current user is DBA: False",
          ": 'foobar'")),
        ("-u 'http://testbed/postgresql/get_int.php?id=1' --flush-session --technique=U --is-dba --dump -D CD --banner --sql-query=\"SELECT 'foobar'\"",
         ("x86_64-pc-linux-gnu", "Database: public", "Table: testusers",
          "5 entries", "id", "name", "surname", "luther", "blisset", "NULL",
          "Title: Generic UNION query (NULL) - 3 columns",
          "the back-end DBMS is PostgreSQL", "appears to have 3 columns",
          "current user is DBA: False", ": 'foobar'")),
        ("-u 'http://testbed/postgresql/get_int.php?id=1' --flush-session --hex --banner --current-user --current-db --search -C surname --answers='dump=n'",
         ("Title: AND boolean-based blind",
          "Title: PostgreSQL AND error-based",
          "Title: PostgreSQL > 8.1 stacked queries",
          "Title: PostgreSQL > 8.1 AND time-based blind",
          "Title: Generic UNION query (NULL) - 3 columns",
          "x86_64-pc-linux-gnu",
          "current schema (equivalent to database on PostgreSQL): 'public'",
          "current user: '******'", "[1 column]", "| surname | varchar |")),
    )

    retVal = True
    count = 0

    for options, checks in TESTS:
        status = '%d/%d (%d%%) ' % (count, len(TESTS),
                                    round(100.0 * count / len(TESTS)))
        dataToStdout("\r[%s] [INFO] complete: %s" %
                     (time.strftime("%X"), status))

        cmd = "%s %s %s --batch" % (sys.executable,
                                    os.path.abspath(
                                        os.path.join(os.path.dirname(__file__),
                                                     "..", "..",
                                                     "sqlmap.py")), options)
        output = shellExec(cmd)

        if not all(
            (check in output if not check.startswith('~') else check[1:] not in
             output) for check in checks):
            for check in checks:
                if check not in output:
                    print(cmd, check)
            dataToStdout("---\n\n$ %s\n" % cmd)
            dataToStdout("%s---\n" % clearColors(output))
            retVal = False

        count += 1

    clearConsoleLine()
    if retVal:
        logger.info("bed test final result: PASSED")
    else:
        logger.error("best test final result: FAILED")

    return retVal
Esempio n. 8
0
def vulnTest():
    """
    Runs the testing against 'vulnserver'
    """

    TESTS = (
        ("--flush-session", ("CloudFlare", )),
        ("--flush-session --data='{\"id\": 1}' --banner", ("Payload: {\"id\"",
                                                           "banner: '3")),
        ("--flush-session --data='<root><param name=\"id\" value=\"1*\"/></root>' --mobile --banner --smart",
         ("Payload: <root><param name=\"id\" value=\"1", "banner: '3")),
        ("--flush-session --method=PUT --data='a=1&b=2&c=3&id=1' --skip-static --dump -T users --start=1 --stop=2",
         ("Parameter: id (PUT)", "2 entries")),
        ("--flush-session -H 'id: 1*' --tables",
         ("Parameter: id #1* ((custom) HEADER)", " users ")),
        ("--flush-session --cookie=\"PHPSESSID=d41d8cd98f00b204e9800998ecf8427e; id=1*; id2=2\" --tables --union-cols=3",
         ("Cookie #1* ((custom) HEADER)", " users ")),
        ("--flush-session --parse-errors --eval=\"id2=2\" --referer=\"localhost\"",
         (": syntax error", "Type: boolean-based blind",
          "Type: time-based blind", "Type: UNION query",
          "back-end DBMS: SQLite", "3 columns")),
        ("--banner --schema --dump -T users --binary-fields=surname --where \"id>3\"",
         ("banner: '3", "INTEGER", "TEXT", "id", "name", "surname",
          "2 entries", "6E616D6569736E756C6C")),
        ("--all --tamper=between,randomcase",
         ("5 entries", "luther", "blisset", "fluffy",
          "179ad45c6ce2cb97cf1029e212046e81", "NULL", "nameisnull",
          "testpass")),
        ("-z \"tec=B\" --hex --fresh-queries --threads=4 --sql-query=\"SELECT 987654321\"",
         (
             "length of query output",
             ": '987654321'",
         )),
        ("--technique=T --fresh-queries --sql-query=\"SELECT 1234\"",
         (": '1234'", )),
    )

    retVal = True
    count = 0
    address, port = "127.0.0.10", random.randint(1025, 65535)

    def _thread():
        vulnserver.init(quiet=True)
        vulnserver.run(address=address, port=port)

    thread = threading.Thread(target=_thread)
    thread.daemon = True
    thread.start()

    for options, checks in TESTS:
        status = '%d/%d (%d%%) ' % (count, len(TESTS),
                                    round(100.0 * count / len(TESTS)))
        dataToStdout("\r[%s] [INFO] complete: %s" %
                     (time.strftime("%X"), status))

        cmd = "%s %s -u http://%s:%d/?id=1 --batch %s" % (
            sys.executable,
            os.path.abspath(
                os.path.join(os.path.dirname(__file__), "..", "..",
                             "sqlmap.py")), address, port, options)
        output = shellExec(cmd)

        if not all(check in output for check in checks):
            dataToStdout("---\n\n$ %s\n" % cmd)
            dataToStdout("%s---\n" % clearColors(output))
            retVal = False

        count += 1

    clearConsoleLine()
    if retVal:
        logger.info("vuln test final result: PASSED")
    else:
        logger.error("vuln test final result: FAILED")

    return retVal
Esempio n. 9
0
def vulnTest():
    """
    Runs the testing against 'vulnserver'
    """

    TESTS = (
        ("-h", ("to see full list of options run with '-hh'", )),
        ("--dependencies --deprecations",
         ("sqlmap requires", "third-party library", "~DeprecationWarning:")),
        ("-u <url> --data='reflect=1' --flush-session --wizard --disable-coloring",
         ("Please choose:", "back-end DBMS: SQLite",
          "current user is DBA: True", "banner: '3.")),
        ("-u <url> --data='code=1' --code=200 --technique=B --banner --no-cast --flush-session",
         ("back-end DBMS: SQLite", "banner: '3.", "~COALESCE(CAST(")),
        (u"-c <config> --flush-session --output-dir=\"<tmdir>\"--smart --roles --statements --hostname --privileges --sql-query=\"SELECT '\u0161u\u0107uraj'\" --technique=U",
         (u": '\u0161u\u0107uraj'", "on SQLite it is not possible",
          "as the output directory")),
        (u"-u <url> --flush-session --sql-query=\"SELECT '\u0161u\u0107uraj'\" --technique=B --no-escape --string=luther --unstable",
         (u": '\u0161u\u0107uraj'", )),
        ("-m <multiple> --flush-session --technique=B --banner",
         ("URL 3:", "back-end DBMS: SQLite", "banner: '3.")),
        ("--dummy", ("all tested parameters do not appear to be injectable",
                     "does not seem to be injectable",
                     "there is not at least one", "~might be injectable")),
        ("-u '<url>&id2=1' -p id2 -v 5 --flush-session --level=5 --text-only --test-filter='AND boolean-based blind - WHERE or HAVING clause (MySQL comment)'",
         ("~1AND", )),
        ("--list-tampers", ("between", "MySQL", "xforwardedfor")),
        ("-r <request> --flush-session -v 5 --test-skip='heavy' --save=<config>",
         ("CloudFlare", "web application technology: Express",
          "possible DBMS: 'SQLite'", "User-agent: foobar",
          "~Type: time-based blind",
          "saved command line options to the configuration file")),
        ("-c <config>", ("CloudFlare", "possible DBMS: 'SQLite'",
                         "User-agent: foobar", "~Type: time-based blind")),
        ("<piped> -r <request> -l <log> --flush-session --banner --technique=B",
         ("banner: '3.", "STDIN")),
        ("-l <log> --flush-session --keep-alive --skip-waf -vvvvv --technique=U --union-from=users --banner --parse-errors",
         ("banner: '3.", "ORDER BY term out of range", "~xp_cmdshell",
          "Connection: keep-alive")),
        ("-l <log> --offline --banner -v 5", ("banner: '3.",
                                              "~[TRAFFIC OUT]")),
        ("-u <base> --flush-session --data='id=1&_=Eewef6oh' --chunked --randomize=_ --random-agent --banner",
         ("fetched random HTTP User-Agent header value",
          "Parameter: id (POST)", "Type: boolean-based blind",
          "Type: time-based blind", "Type: UNION query", "banner: '3.")),
        ("-u <base64> -p id --base64=id --data='base64=true' --flush-session --banner --technique=B",
         ("banner: '3.", )),
        ("-u <base64> -p id --base64=id --data='base64=true' --flush-session --tables --technique=U",
         (" users ", )),
        ("-u <url> --flush-session --banner --technique=B --disable-precon --not-string 'no results'",
         ("banner: '3.", )),
        ("-u <url> --flush-session --encoding=gbk --banner --technique=B --first=1 --last=2",
         ("banner: '3.'", )),
        ("-u <url> --flush-session --encoding=ascii --forms --crawl=2 --threads=2 --banner",
         ("total of 2 targets", "might be injectable", "Type: UNION query",
          "banner: '3.")),
        ("-u <base> --flush-session --data='{\"id\": 1}' --banner",
         ("might be injectable", "3 columns", "Payload: {\"id\"",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "banner: '3.")),
        ("-u <base> --flush-session -H 'Foo: Bar' -H 'Sna: Fu' --data='<root><param name=\"id\" value=\"1*\"/></root>' --union-char=1 --mobile --answers='smartphone=3' --banner --smart -v 5",
         ("might be injectable", "Payload: <root><param name=\"id\" value=\"1",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "banner: '3.", "Nexus", "Sna: Fu", "Foo: Bar")),
        ("-u <base> --flush-session --method=PUT --data='a=1;id=1;b=2' --param-del=';' --skip-static --har=<tmp> --dump -T users --start=1 --stop=2",
         ("might be injectable", "Parameter: id (PUT)",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "2 entries")),
        ("-u <url> --flush-session -H 'id: 1*' --tables -t <tmp>",
         ("might be injectable", "Parameter: id #1* ((custom) HEADER)",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", " users ")),
        ("-u <url> --flush-session --banner --invalid-logical --technique=B --predict-output --test-filter='OR boolean' --tamper=space2dash",
         ("banner: '3.", " LIKE ")),
        ("-u <url> --flush-session --cookie=\"PHPSESSID=d41d8cd98f00b204e9800998ecf8427e; id=1*; id2=2\" --tables --union-cols=3",
         ("might be injectable", "Cookie #1* ((custom) HEADER)",
          "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", " users ")),
        ("-u <url> --flush-session --null-connection --technique=B --tamper=between,randomcase --banner --count -T users",
         ("NULL connection is supported with HEAD method", "banner: '3.",
          "users | 5")),
        ("-u <url> --flush-session --parse-errors --test-filter=\"subquery\" --eval=\"import hashlib; id2=2; id3=hashlib.md5(id.encode()).hexdigest()\" --referer=\"localhost\"",
         ("might be injectable", ": syntax error", "back-end DBMS: SQLite",
          "WHERE or HAVING clause (subquery")),
        ("-u <url> --banner --schema --dump -T users --binary-fields=surname --where \"id>3\"",
         ("banner: '3.", "INTEGER", "TEXT", "id", "name", "surname",
          "2 entries", "6E616D6569736E756C6C")),
        ("-u <url> --technique=U --fresh-queries --force-partial --dump -T users --dump-format=HTML --answers=\"crack=n\" -v 3",
         ("performed 6 queries", "nameisnull", "~using default dictionary",
          "dumped to HTML file")),
        ("-u <url> --flush-session --all",
         ("5 entries", "Type: boolean-based blind", "Type: time-based blind",
          "Type: UNION query", "luther", "blisset", "fluffy",
          "179ad45c6ce2cb97cf1029e212046e81", "NULL", "nameisnull",
          "testpass")),
        ("-u <url> -z \"tec=B\" --hex --fresh-queries --threads=4 --sql-query=\"SELECT * FROM users\"",
         ("SELECT * FROM users [5]", "nameisnull")),
        ("-u '<url>&echo=foobar*' --flush-session",
         ("might be vulnerable to cross-site scripting", )),
        ("-u '<url>&query=*' --flush-session --technique=Q --banner",
         ("Title: SQLite inline queries", "banner: '3.")),
        ("-d <direct> --flush-session --dump -T users --dump-format=SQLITE --binary-fields=name --where \"id=3\"",
         ("7775", "179ad45c6ce2cb97cf1029e212046e81 (testpass)",
          "dumped to SQLITE database")),
        ("-d <direct> --flush-session --banner --schema --sql-query=\"UPDATE users SET name='foobar' WHERE id=5; SELECT * FROM users; SELECT 987654321\"",
         (
             "banner: '3.",
             "INTEGER",
             "TEXT",
             "id",
             "name",
             "surname",
             "5, foobar, nameisnull",
             "[*] 987654321",
         )),
        ("--purge -v 3", ("~ERROR", "~CRITICAL",
                          "deleting the whole directory tree")),
    )

    retVal = True
    count = 0
    address, port = "127.0.0.10", random.randint(1025, 65535)

    def _thread():
        vulnserver.init(quiet=True)
        vulnserver.run(address=address, port=port)

    thread = threading.Thread(target=_thread)
    thread.daemon = True
    thread.start()

    while True:
        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        try:
            s.connect((address, port))
            s.send(b"GET / HTTP/1.0\r\n\r\n")
            if b"vulnserver" in s.recv(4096):
                break
        except:
            time.sleep(1)
        finally:
            s.close()

    handle, config = tempfile.mkstemp(suffix=".conf")
    os.close(handle)

    handle, database = tempfile.mkstemp(suffix=".sqlite")
    os.close(handle)

    with sqlite3.connect(database) as conn:
        c = conn.cursor()
        c.executescript(vulnserver.SCHEMA)

    handle, request = tempfile.mkstemp(suffix=".req")
    os.close(handle)

    handle, log = tempfile.mkstemp(suffix=".log")
    os.close(handle)

    handle, multiple = tempfile.mkstemp(suffix=".lst")
    os.close(handle)

    content = "POST / HTTP/1.0\nUser-agent: foobar\nHost: %s:%s\n\nid=1\n" % (
        address, port)

    open(request, "w+").write(content)
    open(log, "w+").write(
        '<port>%d</port><request base64="true"><![CDATA[%s]]></request>' %
        (port, encodeBase64(content, binary=False)))

    base = "http://%s:%d/" % (address, port)
    url = "%s?id=1" % base
    direct = "sqlite3://%s" % database
    tmpdir = tempfile.mkdtemp()

    content = open(
        os.path.abspath(
            os.path.join(os.path.dirname(__file__), "..", "..",
                         "sqlmap.conf"))).read().replace(
                             "url =", "url = %s" % url)
    open(config, "w+").write(content)

    open(multiple, "w+").write("%s?%s=%d\n%s?%s=%d\n%s&%s=1" %
                               (base, randomStr(), randomInt(), base,
                                randomStr(), randomInt(), url, randomStr()))

    for options, checks in TESTS:
        status = '%d/%d (%d%%) ' % (count, len(TESTS),
                                    round(100.0 * count / len(TESTS)))
        dataToStdout("\r[%s] [INFO] complete: %s" %
                     (time.strftime("%X"), status))

        for tag, value in (("<url>", url), ("<base>", base),
                           ("<direct>", direct), ("<tmpdir>", tmpdir),
                           ("<request>", request), ("<log>", log),
                           ("<multiple>", multiple), ("<config>", config),
                           ("<base64>", url.replace("id=1", "id=MZ=%3d"))):
            options = options.replace(tag, value)

        cmd = "%s \"%s\" %s --batch --non-interactive --debug" % (
            sys.executable,
            os.path.abspath(
                os.path.join(os.path.dirname(__file__), "..", "..",
                             "sqlmap.py")), options)

        if "<tmp>" in cmd:
            handle, tmp = tempfile.mkstemp()
            os.close(handle)
            cmd = cmd.replace("<tmp>", tmp)

        if "<piped>" in cmd:
            cmd = re.sub(r"<piped>\s*", "", cmd)
            cmd = "echo %s | %s" % (url, cmd)

        output = shellExec(cmd)

        if not all(
            (check in output if not check.startswith('~') else check[1:] not in
             output) for check in checks) or "unhandled exception" in output:
            dataToStdout("---\n\n$ %s\n" % cmd)
            dataToStdout("%s---\n" % output, coloring=False)
            retVal = False

        count += 1

    clearConsoleLine()
    if retVal:
        logger.info("vuln test final result: PASSED")
    else:
        logger.error("vuln test final result: FAILED")

    return retVal