Skip to content

SecWordVault is a specialized repository with wordlists for testing SQL injection vulnerabilities related to parameters and integers.

Notifications You must be signed in to change notification settings

temno18/VLNlist

Repository files navigation

VLNlist

VLNlist is a specialized repository featuring wordlists designed for testing SQL injection vulnerabilities related to parameters and integers.

Tutorial: Running SQL Injection Vulnerability Tests with SecWordVault and Gobuster

  1. Requirements:

    • Gobuster installed on your system. If not installed, download it from Gobuster GitHub repository.
    • VLNlist repository cloned or downloaded to your local machine. Ensure you have the necessary wordlists specific to SQL injection parameters and integers.
  2. Setting Up:

    • Clone or download the VLNlist repository from SecWordVault GitHub repository.

      Clone Using HTTPS (recommended):

      git clone https://github.com/temno18/VLNlist.git

      Clone Using SSH (if SSH keys are set up):

      git clone git@github.com:temno18/VLNlist.git

      Download ZIP:

  3. Running Gobuster with VLNlist:

    • Open your terminal or command prompt.

    • Navigate to the directory where Gobuster is installed or extracted.

    • Use the following command structure to run Gobuster with VLNlist wordlists:

      gobuster sql -u <TARGET_URL> -w <PATH_TO_WORDLIST>

      Replace <TARGET_URL> with the URL of the target website or application where you want to test for SQL injection vulnerabilities.

      Replace <PATH_TO_WORDLIST> with the path to the specific SQL injection wordlist from VLNlist included in your cloned repository. For example:

      gobuster sql -u http://example.com -w /path/to/secwordvault/sql_injection_wordlist.txt
  4. Analyzing Results:

    • Gobuster will begin scanning the specified URL with each payload from the SQL injection wordlist.
    • Monitor the terminal for any indications of successful injections or vulnerabilities detected.
    • Note down any URLs or parameters that return abnormal responses, as these may indicate potential vulnerabilities.

Contributing

Feel free to contribute new wordlists or improvements to existing ones by forking this repository, making your changes, and submitting a pull request.

License

This project is licensed under the MIT License.

About

SecWordVault is a specialized repository with wordlists for testing SQL injection vulnerabilities related to parameters and integers.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published