You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is the expected behavior, because when we use EvilPot, it's to confirm the strength of the POC, and to force the POC to add some features when writing the time blinds, or else it's easy to false alarms.
Because this one does mimic real behavior, it's really unavoidable for the generic dast plugin.
Hi,
In the EvilPot system, it goes to sleep if it matches the
sleep
orwaitfor
function.xray/tests/evilpot/evil/evil.go
Lines 73 to 95 in e0e361a
However, the sleep action behaves the same as a real-world time-based SQL injection.
How can I modify my plugin to fix this false negative?
Try to perform calculation in the sleep function like
sleep(1+1)
?or try to add another request with payload that will cause sql error like
ssleep(1)
to see if it still sleeps?However, EvilPot can still adapt to the above false positive check,
since in time-based SQL injection, it seems like the sleep time is the only condition we can rely on.
I'm really looking forward to your reply.
Thanks
The text was updated successfully, but these errors were encountered: