sqlmap

Automatic blind SQL injection tool, developed in python, capable to perform an active database management system finger
Download

sqlmap Ranking & Summary

Advertisement

  • Rating:
  • License:
  • GPL
  • Price:
  • FREE
  • Publisher Name:
  • Bernardo Damele
  • Publisher web site:
  • Operating Systems:
  • Mac OS X
  • File Size:
  • 1.9 MB

sqlmap Tags


sqlmap Description

Automatic blind SQL injection tool, developed in python, capable to perform an active database management system finger sqlmap is an automatic SQL injection tool entirely developed in Python. sqlmap is capable to perform an extensive database management system back-end fingerprint, read system files, retrieve remote DBMS databases, tables, usernames, columns, enumerate entire DBMS, and take advantage of web application programming security fla. Main features of sqlmap: Full support for MySQL, Oracle, PostgreSQL and Microsoft SQL Server database management system back-end. Besides these four DBMS, sqlmap can also identify Microsoft Access, DB2, Informix and Sybase; Extensive database management system back-end fingerprint based upon: Inband DBMS error messages DBMS banner parsing DBMS functions output comparison DBMS specific features such as MySQL comment injection Passive SQL injection fuzzing It fully supports two SQL injection techniques: Blind SQL injection Inband SQL injection, also known as UNION query SQL injection and it partially supports error based SQL injection as one of the vectors for database management system fingerprint; It automatically tests all provided GET, POST, Cookie and User-Agent parameters to find dynamic ones. On these it automatically tests and detects the ones affected by SQL injection. Moreover each dynamic parameter is tested for numeric, single quoted string, double quoted string and all of these three type with one and two brackets to find which is the valid syntax to perform further injections with; It is possible to provide the name of the only parameter(s) that you want to perform tests and use for injection on, being them GET, POST, Cookie parameters; SQL injection testing and detection does not depend upon the web application database management system back-end. SQL injection exploiting and query syntax obviously depend upon the web application database management system back-end; It recognizes valid queries by false ones based upon HTML output page hashes comparison by default, but it is also possible to choose to perform such test based upon string matching; HTTP requests can be performed in both HTTP method GET and POST (default: GET); It is possible to perform HTTP requests using a HTTP User-Agent header string randomly selected from a text file; It is possible to provide a HTTP Cookie header string, useful when the web application requires authentication based upon cookies and you have such data; It is possible to provide an anonymous HTTP proxy address and port to pass by the HTTP requests to the target URL; It is possible to provide the remote DBMS back-end if you already know it making sqlmap save some time to fingerprint it; It supports various command line options to get database management system banner, current DBMS user, current DBMS database, enumerate users, users password hashes, databases, tables, columns, dump tables entries, dump the entire DBMS, retrieve an arbitrary file content (if the remote DBMS is MySQL) and provide your own SQL SELECT statement to be evaluated; It is possible to make sqlmap automatically detect if the affected parameter is also affected by an UNION query SQL injection and, in such case, to use it to exploit the vulnerability; It is possible to exclude system databases when enumerating tables, useful when dumping the entire DBMS databases tables entries and you want to skip the default DBMS data; It is possible to view the Estimated time of arrival for each query output, updated in real time while performing the SQL injection attack; Support to increase the verbosity level of output messages; It is possible to save queries performed and their retrieved value in real time on an output text file and continue the injection resuming from such file in a second time; PHP setting magic_quotes_gpc bypass by encoding every query string, between single quotes, with CHAR (or similar) DBMS specific function. What's New in This Release: Major enhancement to make the comparison algorithm work properly also on url not stables automatically by using the difflib Sequence Matcher object; Major enhancement to support SQL data definition statements, SQL data manipulation statements, etc from user in SQL query and SQL shell if stacked queries are supported by the web application technology; Major speed increase in DBMS basic fingerprint; Minor enhancement to support an option (--is-dba) to show if the current user is a database management system administrator; Minor enhancement to support an option (--union-tech) to specify the technique to use to detect the number of columns used in the web application SELECT statement: NULL bruteforcing (default) or ORDER BY clause bruteforcing; Added internal support to forge CASE statements, used only by --is-dba query at the moment; Minor layout adjustment to the --update output; Increased default timeout to 30 seconds; Major bug fix to correctly handle custom SQL "limited" queries on Microsoft SQL Server and Oracle; Major bug fix to avoid tracebacks when multiple targets are specified and one of them is not reachable; Minor bug fix to make the Partial UNION query SQL injection technique work properly also on Oracle and Microsoft SQL Server; Minor bug fix to make the --postfix work even if --prefix is not provided; Updated documentation.


sqlmap Related Software