mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-12-06 12:41:30 +00:00
Implements #3895
This commit is contained in:
@@ -709,6 +709,7 @@ def attackDumpedTable():
|
||||
if hash_:
|
||||
key = hash_ if hash_ not in replacements else replacements[hash_]
|
||||
lut[key.lower()] = password
|
||||
lut["0x%s" % key.lower()] = password
|
||||
|
||||
debugMsg = "post-processing table dump"
|
||||
logger.debug(debugMsg)
|
||||
@@ -943,6 +944,8 @@ def dictionaryAttack(attack_dict):
|
||||
if hash_regex in (HASH.MD5_BASE64, HASH.SHA1_BASE64, HASH.SHA256_BASE64, HASH.SHA512_BASE64):
|
||||
item = [(user, encodeHex(decodeBase64(hash_, binary=True))), {}]
|
||||
elif hash_regex in (HASH.MYSQL, HASH.MYSQL_OLD, HASH.MD5_GENERIC, HASH.SHA1_GENERIC, HASH.SHA224_GENERIC, HASH.SHA256_GENERIC, HASH.SHA384_GENERIC, HASH.SHA512_GENERIC, HASH.APACHE_SHA1):
|
||||
if hash_.startswith("0x"): # Reference: https://docs.microsoft.com/en-us/sql/t-sql/functions/hashbytes-transact-sql?view=sql-server-2017
|
||||
hash_ = hash_[2:]
|
||||
item = [(user, hash_), {}]
|
||||
elif hash_regex in (HASH.SSHA,):
|
||||
item = [(user, hash_), {"salt": decodeBase64(hash_, binary=True)[20:]}]
|
||||
|
||||
Reference in New Issue
Block a user