Monday, March 23, 2009

Blind Sql Injection Brute Forcer version 2

This is a modified version of ''. This perl script allows extraction of data from Blind SQL Injections. It accepts custom SQL queries as a command line parameter and it works for both integer and string based injections. Databases supported:-


1. MySQL

2. PostgreSQL

3. Oracle

The tool supports 3 attack modes(-type switch):-

Type 0: Blind SQL Injection based on true and false conditions returned by back-end server

Type 1: Blind SQL Injection based on true and error(e.g syntax error) returned by back-end server.

Type 2: Blind SQL Injection in "order by" and "group by".

Usage example: $./ -url -method post -match true -database 0 -sql "select top 1 name from sysobjects where xtype='U'"


No comments: