Waraxe IT Security Portal
Login or Register
September 8, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 74
Members: 0
Total: 74
Full disclosure
[SYSS-2024-030]: C-MOR Video Surveillance - OS Command Injection (CWE-78)
[SYSS-2024-029]: C-MOR Video Surveillance - Dependency on Vulnerable Third-Party Component (CWE-1395)
[SYSS-2024-028]: C-MOR Video Surveillance - Cleartext Storage of Sensitive Information (CWE-312)
[SYSS-2024-027]: C-MOR Video Surveillance - Improper Privilege Management (CWE-269)
[SYSS-2024-026]: C-MOR Video Surveillance - Unrestricted Upload of File with Dangerous Type (CWE-434)
[SYSS-2024-025]: C-MOR Video Surveillance - Relative Path Traversal (CWE-23)
Backdoor.Win32.Symmi.qua / Remote Stack Buffer Overflow (SEH)
HackTool.Win32.Freezer.br (WinSpy) / Insecure CredentialStorage
Backdoor.Win32.Optix.02.b / Weak Hardcoded Credentials
Backdoor.Win32.JustJoke.2 1 (BackDoor Pro) / Unauthenticated Remote Command Execution
Backdoor.Win32.PoisonIvy. ymw / Insecure Credential Storage
[SYSS-2024-024]: C-MOR Video Surveillance - Improper Access Control (CWE-284)
[SYSS-2024-023]: C-MOR Video Surveillance - SQL Injection(CWE-89)
[SYSS-2024-022]: C-MOR Video Surveillance - Cross-Site Request Forgery (CWE-352)
[SYSS-2024-021]: C-MOR Video Surveillance - Persistent Cross-Site Scripting (CWE-79)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Sql injection -> I need SQL Injection Exploit tool
Post new topicReply to topic View previous topic :: View next topic
I need SQL Injection Exploit tool
PostPosted: Sun Feb 05, 2006 3:27 am Reply with quote
yak
Beginner
Beginner
Joined: Feb 05, 2006
Posts: 1




Hi everyone,
I need a tool that can exploit SQL Injection websites and download their databases to my PC. I need it very much. I tried many tools before but not success Sad
Would you pls share me that tool?
Thanks a lot.
View user's profile Send private message
Re: I need SQL Injection Exploit tool
PostPosted: Wed Mar 22, 2006 11:07 pm Reply with quote
nooob
Beginner
Beginner
Joined: Mar 23, 2006
Posts: 2




need it here too.
View user's profile Send private message
PostPosted: Thu Mar 23, 2006 1:00 am Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Here are some t00lz:

http://www.databasesecurity.com/sqlinjection-tools.htm

Hope it helpz Cool
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Sat Apr 15, 2006 10:02 pm Reply with quote
Indiction
Regular user
Regular user
Joined: Apr 12, 2006
Posts: 11




basic perl script for injection

Code:

#!/etc/bin/perl
# replace this line with #!C:\Perl\bin\perl on a Windows system
# provided AS-IS, no warranty, expressed or implied
# this program is completely in the public domain: you can modify it at will

# with Windows, use ActivePerl www.activestate.com
# UNIX should already have it preinstalled

use IO::Socket;

if(@ARGV < 3)
{
die "usage: perl sqlinj.pl server path string\n";
}

$server = $ARGV[0];
$path = $ARGV[1];
$string = $ARGV[2];

# this method uses GET

$sock = IO::Socket::INET->new(Proto => 'tcp', PeerAddr => "$server", PeerPort => 80) or die "could not connect to the server: $!\n";
$inject = sprintf("%s?%s", $path, $string);
print $sock "GET $inject HTTP/1.1\n"
print $sock "User-Agent: sqlinj.pl/1.0 (Windows NT 5.1; U; en)\n"; # feel free to change if not WinXP
print $sock "Host: www.$server\n";
print $sock "Accept: */*\n";
print $sock "Connection: close\n\n";

while($data = <$sock>)
{
print "$data";
}

print "\n[output complete.]\n";
View user's profile Send private message
PostPosted: Sat May 13, 2006 2:01 pm Reply with quote
julia
Beginner
Beginner
Joined: May 13, 2006
Posts: 2




Indiction wrote:
basic perl script for injection
Code:
[... Too long to quote ...]

There is an error:
Code:
C:\Borland\BCC55_2\Include>perl C:\***\sql_injector.pl
syntax error at C:\***\sql_injector.pl line 25, near "print"
Execution of C:\***\sql_injector.pl aborted due to compilation erro
rs.

???
View user's profile Send private message
PostPosted: Sat May 13, 2006 2:17 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




First, I suggest to use ActivePerl on Windows platform:

http://www.activestate.com/Products/ActivePerl/?mp=1

Second, looking @ this perl script, it seems useless for me. Just empty container for GET request. No functionality at all.

Third - UserAgent string like "User-Agent: sqlinj.pl/1.0 (Windows NT 5.1; U; en)" is very bad practice. Just emulate IE or firefox, so server logs are cleaner after attacking.

Fourth - I suggest to try POST and/or COOKIE attack vectors in case of php based target. Becasue in this way web server will not log attack attempt details at all (in most cases).
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed May 17, 2006 12:26 am Reply with quote
trace
Regular user
Regular user
Joined: May 17, 2006
Posts: 8




I have some tools have to do with SQLinjector,but those writen by chinaese.
View user's profile Send private message Visit poster's website MSN Messenger
I need SQL Injection Exploit tool
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.171 Seconds