Skip to main content

HTTP Proxy for using sqlmap against websockets

Project description

sqlmap Websocket Proxy

💉Tool to enable blind sql injection attacks against websockets using sqlmap

Heavily based on an excellent writeup from Rayhan Ahmed: Automating Blind SQL injection over WebSocket

Example

sqlmap-websocket-proxy -u ws://sketcy.lol:1337 -p '{"id": "%param%"}'
python3 sqlmap.py -u  http://localhost:8080/?param1=1

Usage

usage: sqlmap-websocket-proxy [-h] -u URL -d DATA [-p PORT]

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     URL to the websocket (example: ws://vuln_server:1337/ws)
  -d DATA, --data DATA  Paylod with injectable fields encoded as '%param%' (example: {"id": "%param%"})
  -p PORT, --port PORT  Proxy Port (default: 8080)

Installation

PyPI

python3 -m pip install sqlmap-websocket-proxy

Manual

python3 -m pip install sqlmap_websocket_proxy-1.1.0-py3-none-any.whl

Git

python3 -m pip install .

Download Latest Release

Demo

demo

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

sqlmap-websocket-proxy-1.1.0.tar.gz (5.1 kB view hashes)

Uploaded Source

Built Distribution

sqlmap_websocket_proxy-1.1.0-py3-none-any.whl (6.3 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page