Skip to content

Instantly share code, notes, and snippets.

@mgeeky
Last active March 7, 2024 17:55
Show Gist options
  • Star 29 You must be signed in to star a gist
  • Fork 12 You must be signed in to fork a gist
  • Save mgeeky/fb4eab1a6d428d183ab3f9a14b504233 to your computer and use it in GitHub Desktop.
Save mgeeky/fb4eab1a6d428d183ab3f9a14b504233 to your computer and use it in GitHub Desktop.
SQLMap Tamper scripts evaluation against F5 Big-IP ASM WAF

SQLMap Tamper scripts evaluation against F5 Big-IP ASM WAF

The below table represents results of tests launched against F5 Big-IP ASM WAF appliance in it's XX version of YY and ZZ version of XY

Below names are to be passed to the --tamper= parameter of sqlmap.

The column Violation Rating represents most dominant rating of topmost 20 Requests observed by F5 in it's Security>>Event Logs:Application:Requests view.

The scale is 0-5.

Tamper script(s) used Violation Rating
apostrophemask 3-5
apostrophenullencode 4
appendnullbyte 5
base64encode 3
between 4
bluecoat 4
chardoubleencode 4
charencode 4
charunicodeencode 4
charunicodeescape 4
commalesslimit 3-4
commalessmid 4
concat2concatws 4
equaltolike 4
greatest 4
halfversionedmorekeywords 4
htmlencode 4
ifnull2ifisnull 4
informationschemacomment 4
least 4
lowercase 4
modsecurityversioned 4
modsecurityzeroversioned 3-4
multiplespaces 4
nonrecursivereplacement 1-3
overlongutf8 3
overlongutf8more 3
percentage 2
plus2concat 4
plus2fnconcat 4
randomcase 4
randomcomments 2-3
securesphere 4
space2comment 4
space2dash 3-4
space2hash 1-3
space2morecomment 4
space2morehash 1
space2mssqlblank 2-4
space2mssqlhash 4
space2mysqlblank 3-4
space2mysqldash 4
space2plus 3-4
space2randomblank 4
symboliclogical 4
sp_password 4
unionalltounion 4
unmagicquotes 4
uppercase 4
varnish 4
versionedkeywords 2
versionedmorekeywords 4
xforwardedfor 4
nonrecursivereplacement,space2morehash,space2hash 1

Among longer combinations:

Tamper script(s) used Violation Rating
apostrophemask,apostrophenullencode,appendnullbyte,base64encode,between,bluecoat,chardoubleencode,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzerovers 1
between,bluecoat,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2hash,space2morehash,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords,xforwardedfor 1
apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes 1
apostrophemask,apostrophenullencode,appendnullbyte,base64encode,between,bluecoat,chardoubleencode,charencode,charunicodeencode,charunicodeescape,commalesslimit,commalessmid,commentbeforeparentheses,concat2concatws,equaltolike,escapequotes,greatest,halfversionedmorekeywords,htmlencode,ifnull2casewhenisnull,ifnull2ifisnull,informationschemacomment,least,lowercase,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,overlongutf8,overlongutf8more,percentage,plus2concat,plus2fnconcat,randomcase,randomcomments,securesphere,sp_password,space2comment,space2dash,space2hash,space2morecomment,space2morehash,space2mssqlblank,space2mssqlhash,space2mysqlblank,space2mysqldash,space2plus,space2randomblank,symboliclogical,unionalltounion,unmagicquotes,uppercase,varnish,versionedkeywords,versionedmorekeywords,xforwardedfor 5

The last row represents all of tamper scripts used at once score. It looks like, it's not a good idea to use them all at once.

From tamper scripts that did best in this evaluation, we can point out:

  • nonrecursivereplacement
  • space2morehash
  • space2hash

Although, they had not been tested against actual vulnerability, therefore this evalution does not take in account whether SQLMap was able to attack the vulnerability at all.

@687766616e
Copy link

687766616e commented Oct 3, 2018

Could you update this regularly? (it is very useful to me

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment