![]() This time it will be:įullurl = input("Please specify the full vulnerable url: ")Įxplanation: 'variable = input("Input: ")' sets the var 'variable' to user input, 'Input: ' is the text seen by the user at the input line.Ģ) Use arguments for specifying the data:Įxplanation: 'if' is a well known macro stament. This time we will use the first one, but it does not affect other lines of code.ġ) Use input("") commands to get user input. Now we need to select the input type, the first one is pretty simple, the other one is harder. This time we will use sys, urllib and urllib.request modules, so import those 3 by using import sys, urllib, urllib.request or import sys, import urllib and import urllib.request in the new lineĮxplanation: 'import' is used for importing libraries, such as urllib or os, system. Step by step Code your first simple SQLi checking vulnerability with Python:īefore starting coding, make a new. You can find vulnerable site dumps over the web. ![]() You can easily find a website for testing using simple SQLi dorks, like inurl:"index.php?cat_id=". Python is written in C, it is one of the easiest programming languages for hacking tools, it includes alot of very useful libs, today, we will use 1 of them, ![]() If you haven't got installed Python yet, download it from the following link: ![]() It will work only on GET parameter using websites. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |