Full Disclosure mailing list archives
sqlninja 0.2.5 released!
From: icesurfer <r00t () northernfortress net>
Date: Sun, 09 May 2010 14:49:15 +0100
Hello security enthusiasts, It's been 2 years, but a new version of sqlninja is out at Sourceforge! Introduction ============ Sqlninja is a tool to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide an interactive access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered. It is written in Perl, it is released under the GPLv2 and so far has been successfully tested on: - Linux - FreeBSD - Mac OS X You can find it, together with a flash demo of its features, at the address http://sqlninja.sourceforge.net What's new ========== # Proxy support (it was about time!) # No more 64k bytes limit in upload mode # Upload mode is also massively faster # Privilege escalation through token kidnapping (kudos to Cesar Cerrudo) # Other minor improvements What's not so new ================= # Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode) # Bruteforce of 'sa' password (in 2 flavors: dictionary-based and incremental) # Privilege escalation to sysadmin group if 'sa' password has been found # Creation of a custom xp_cmdshell if the original one has been removed # Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed) # TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port that is allowed by the firewall of the target network and use it for a reverse shell # Direct and reverse bindshell, both TCP and UDP # DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for a direct/reverse shell, but the DB server can resolve external hostnames (check the documentation for details about how this works) # Evasion techniques to confuse a few IDS/IPS/WAF # Integration with Metasploit3, to obtain a graphical access to the remote DB server through a VNC server injection Happy hacking ! -- icesurfer _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- sqlninja 0.2.5 released! icesurfer (May 09)