sqli_login_bypass
Bypass login authentication using SQL injection comment truncation. Extracts CSRF tokens and submits crafted payloads to test for SQLi vulnerabilities in login forms.
Instructions
Bypass login via SQL comment truncation (administrator'--). Extracts CSRF token from form, then POSTs with SQLi in the username field. The -- comment truncates the password check. Returns csrf_extracted, status_code, response_length, headers, likely_bypass.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Login form URL, e.g. https://target/login | |
| username | No | Target username to bypass auth for, e.g. 'administrator' | |
| csrf_field | No | Name of the CSRF token field in the form | |
| username_field | No | Name of the username form field | |
| password_field | No | Name of the password form field |