Difference between revisions of "OWASP Backend Security Project Tools"

From OWASP
Jump to: navigation, search
m
 
(15 intermediate revisions by 3 users not shown)
Line 1: Line 1:
== [http://www.owasp.org/index.php/OWASP_Backend_Security_Project_Tools Tools] ==
+
[[Category:OWASP Backend Security Project]]
 +
 
 +
 
 +
= Tools =
  
 
The aim of this section is to enumerate and quickly describe the tools used to find and exploit some vulnerabilities concerning database management systems.
 
The aim of this section is to enumerate and quickly describe the tools used to find and exploit some vulnerabilities concerning database management systems.
  
== [http://sqlninja.sourceforge.net SQL Ninja] ==
+
== SQL Ninja ==
 +
 
 
SQL Ninja is a tool, written in Perl, which helps a penetration tester to gain a shell on a  system running Microsoft SQL server, exploiting a web application resulted vulnerable to SQL Injection.
 
SQL Ninja is a tool, written in Perl, which helps a penetration tester to gain a shell on a  system running Microsoft SQL server, exploiting a web application resulted vulnerable to SQL Injection.
  
== [http://www.sqlpowerinjector.com SQL Power Injector] ==
+
http://sqlninja.sourceforge.net
SQL Power Injector is a .Net 1.1 application used to find and exploit SQL Injection vulnerability through a vulnerable web application which uses SQL Server, MySql, Sybase/Adaptive Server and DB2 Database Management Systems as backend. It’s main feature is the support for multithreaded automation of the injection.
+
  
== [http://sqlmap.sourceforge.net SQLMap] ==  
+
== SQLMap ==
SQLMap is a Python application able to collect information and data, such as databases names, table’s names and contents, and read system files from a MySQL, Oracle, PostgreSQL or Microsoft SQL Server Database Management Systems, exploiting the SQL Injection vulnerability of a vulnerable web application.
+
  
== [http://sqltool.itdefence.ru/indexeng.html SQL Injection Tool] ==
+
sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.
SQL Injection Tool is an application used to exploit SQL Injection vulnerability found in a web application, it’s able to retrieve some useful information and data from a Microsoft SQL server. It also includes a terminal to send raw HTTP requests.  
+
  
== [http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html BobCat] ==
+
http://sqlmap.sourceforge.net
BobCat is a tool based on “Data Thief” and realized in .NET 2.0. It permits to take full advantage of SQL Injection vulnerability discovered in a web application to steal data, gain a shell or a reverse shell on the database management system machine. It has been tested on MSDE2000.
+
  
== [http://www.darknet.org.uk/2007/05/owasp-sqlix-project-sql-injection-scanner OWASP SQLiX] ==  
+
== OWASP SQLiX ==
SQLiX is a tool, written in Perl, able to identify the back-end database, find blind and normal injection and also execute system commands on a Microsoft SQL Server. It was also successfully tested on MySQL and PostgreSQL.
+
  
== [http://www.ngssoftware.com NGSQuirrel] ==
+
SQLiX is a tool, written in Perl, able to identify the back-end database, find blind and normal injection and also execute system commands on a Microsoft SQL Server. It was also successfully tested on MySQL and PostgreSQL.
NGSQuirrel is a tool used to execute vulnerability assessments on database management systems. It’s able to find vulnerabilities and mistaken configuration or policy on SQL Server, Oracle, IBM DB2, Sybase ASE and Informix.
+
 
 +
http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project
 +
 
 +
== Scuba ==
  
== [http://www.imperva.com/products/scuba.html Scuba] ==
 
 
Scuba is a Database vulnerability scanner able to find vulnerabilities like unpatched software, unsafe processes and weak password on Oracle, DB2, Microsoft SQL Server and Sybase.
 
Scuba is a Database vulnerability scanner able to find vulnerabilities like unpatched software, unsafe processes and weak password on Oracle, DB2, Microsoft SQL Server and Sybase.
  
== [http://sqid.rubyforge.org/ SQID SQL Injection Digger] ==  
+
http://www.imperva.com/products/scuba.html
 +
 
 +
== SQID SQL Injection Digger ==
 +
 
 
SQL injection digger is a command line program, written in [http://www.ruby-lang.org/ ruby], that looks for SQL injections and common errors in websites. It can perform the following operations:
 
SQL injection digger is a command line program, written in [http://www.ruby-lang.org/ ruby], that looks for SQL injections and common errors in websites. It can perform the following operations:
 
* Look for SQL injection in a webpage, by looking for links
 
* Look for SQL injection in a webpage, by looking for links
Line 34: Line 38:
 
* Perform a google search for a query and look for SQL injections in the urls found
 
* Perform a google search for a query and look for SQL injections in the urls found
  
== [http://www.ictsc.it/site/IT/projects/sqlDumper/sqlDumper.php SqlDumper] ==
+
http://sqid.rubyforge.org
 +
 
 +
== SqlDumper ==
 +
 
 
Exploiting a SQL injection vulnerability SqlDumper can make dump of any file in the file system. It work only with DBMS MySql.
 
Exploiting a SQL injection vulnerability SqlDumper can make dump of any file in the file system. It work only with DBMS MySql.
  
== Web Application Vulnerability Scanners ==  
+
http://www.ictsc.it/site/IT/projects/sqlDumper/sqlDumper.php
''' The web application vulnerability scanners listed below are able to discover SQL Injection vulnerability: '''
+
 
    - [http://www.acunetix.com/vulnerability-scanner/sql-injection.htm Acunetix]
+
== SQL Power Injector ==
    - [http://www.watchfire.com Appscan]
+
 
    - [http://www.cenzic.com Hailstorm]
+
SQL Power Injector is a .Net 1.1 application used to find and exploit SQL Injection vulnerability through a vulnerable web application which uses SQL Server, MySql, Sybase/Adaptive Server and DB2 Database Management Systems as backend. It’s main feature is the support for multithreaded automation of the injection.
    - [http://www.whitehatsec.com/services.shtml Sentinel]
+
 
    - [http://www.spydynamics.com/products/webinspect/toolkit.html SQL Injector (SPI Toolkit)]
+
http://www.sqlpowerinjector.com  
 +
 
 +
== BobCat ==
 +
 
 +
BobCat is a tool based on “Data Thief” and realized in .NET 2.0. It permits to take full advantage of SQL Injection vulnerability discovered in a web application to steal data, gain a shell or a reverse shell on the database management system machine. It has been tested on MSDE2000.
 +
 
 +
http://www.northern-monkee.co.uk/index.html

Latest revision as of 07:28, 13 September 2009


Contents

Tools

The aim of this section is to enumerate and quickly describe the tools used to find and exploit some vulnerabilities concerning database management systems.

SQL Ninja

SQL Ninja is a tool, written in Perl, which helps a penetration tester to gain a shell on a system running Microsoft SQL server, exploiting a web application resulted vulnerable to SQL Injection.

http://sqlninja.sourceforge.net

SQLMap

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

http://sqlmap.sourceforge.net

OWASP SQLiX

SQLiX is a tool, written in Perl, able to identify the back-end database, find blind and normal injection and also execute system commands on a Microsoft SQL Server. It was also successfully tested on MySQL and PostgreSQL.

http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project

Scuba

Scuba is a Database vulnerability scanner able to find vulnerabilities like unpatched software, unsafe processes and weak password on Oracle, DB2, Microsoft SQL Server and Sybase.

http://www.imperva.com/products/scuba.html

SQID SQL Injection Digger

SQL injection digger is a command line program, written in ruby, that looks for SQL injections and common errors in websites. It can perform the following operations:

  • Look for SQL injection in a webpage, by looking for links
  • Submit forms in a webpage to look for SQL injection
  • Crawl a website to perform the above listed operations
  • Perform a google search for a query and look for SQL injections in the urls found

http://sqid.rubyforge.org

SqlDumper

Exploiting a SQL injection vulnerability SqlDumper can make dump of any file in the file system. It work only with DBMS MySql.

http://www.ictsc.it/site/IT/projects/sqlDumper/sqlDumper.php

SQL Power Injector

SQL Power Injector is a .Net 1.1 application used to find and exploit SQL Injection vulnerability through a vulnerable web application which uses SQL Server, MySql, Sybase/Adaptive Server and DB2 Database Management Systems as backend. It’s main feature is the support for multithreaded automation of the injection.

http://www.sqlpowerinjector.com

BobCat

BobCat is a tool based on “Data Thief” and realized in .NET 2.0. It permits to take full advantage of SQL Injection vulnerability discovered in a web application to steal data, gain a shell or a reverse shell on the database management system machine. It has been tested on MSDE2000.

http://www.northern-monkee.co.uk/index.html