Security of Information, Threat Intelligence, Hacking, Offensive Security, Pentest, Open Source, Hackers Tools, Leaks, Pr1v8, Premium Courses Free, etc

Monday, January 18, 2016

Blind SQL Injections - BSQL Hacker



BSQL (Blind SQL) Hacker is an automated SQL Injection Framework / Tool designed to exploit SQL injection vulnerabilities virtually in any database.

BSQL Hacker aims for experienced users as well as beginners who want to automate SQL Injections (especially Blind SQL Injections).It allows metasploit alike exploit repository to share and update exploits.






Blind SQL Hacker Key Features


ÂşEasy Mode
ÂşSQL Injection Wizard
ÂşAutomated Attack Support (database dump)
ÂşORACLE
ÂşMSSQL
ÂşMySQL (experimental)

ÂşGeneral

ÂşFast and Multithreaded
Âş4 Different SQL Injection Support
ÂşBlind SQL Injection
ÂşTime Based Blind SQL Injection
ÂşDeep Blind (based on advanced time delays) SQL Injection
ÂşError Based SQL Injection
ÂşCan automate most of the new SQL Injection methods those relies on Blind SQL Injection
ÂşRegEx Signature support
ÂşConsole and GUI Support
ÂşLoad / Save Support
ÂşToken / Nonce / ViewState etc. Support
ÂşSession Sharing Support
ÂşAdvanced Configuration Support
ÂşAutomated Attack mode, Automatically extract all database schema and data mode

ÂşUpdate / Exploit Repository Features
ÂşMetasploit alike but exploit repository support
ÂşAllows to save and share SQL Injection exploits
ÂşSupports auto-update
ÂşCustom GUI support for exploits (cookie input, URL input etc.)

ÂşGUI Features
ÂşLoad and Save
ÂşTemplate and Attack File Support (Users can save sessions and share them. Some sections like username, password or cookie in the templates can be show to the user in a     GUI)
ÂşVisually view true and false responses as well as full HTML response, including time and stats

ÂşConnection Related
ÂşProxy Support (Authenticated Proxy Support)
ÂşNTLM, Basic Auth Support, use default credentials of current user/application
ÂşSSL (also invalid certificates) Support
ÂşCustom Header Support

ÂşInjection Points (only one of them or combination)
ÂşQuery String
ÂşPost
ÂşHTTP Headers
ÂşCookies

ÂşOther
ÂşPost Injection data can be stored in a separated file
ÂşXML Output (not stable)
ÂşCSRF protection support



Share:

0 comentários:

Post a Comment

Note: Only a member of this blog may post a comment.

Established in 2015. Offensive Sec Blog has been sharing security research, hacking tools, threat intelligence, and offensive security content since 2015.
Copyright © OffSec Blog | Powered by OffensiveSec
Design by OffSec | Built for the security community