– By default, this script will first determine username, version and database name before enumerating the information_schema information.
– When the -q flag is applied, a user can supply any query that returns only a single cell.
– If the exploit or vulnerability requires a single quote, simply tack %27 to the end of the URI.
– This script contains error detection: It will only work on a mysql 5.x database, and knows when its queries have syntax errors.
– This script uses perl’s LibWhisker2 for IDS Evasion (The same as Nikto).
– This script uses the MD5 algorithm for optimization. There are other optimization methods, and this may not work on all sites.
After a year of hardcore development, sqlmap 0.9 is out!
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a kick-ass detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
Rewritten SQL injection detection engine
Support to directly connect to the database without passing via a SQL injection, -d switch
Added full support for both time-based blind SQL injection and error-based SQL injection techniques
Implemented support for SQLite 2 and 3
Implemented support for Firebird
Implemented support for Microsoft Access, Sybase and SAP MaxDB
Added support to tamper injection data with –tamper switch
Added automatic recognition of password hashes format and support to crack them with a dictionary-based attack
Added support to fetch unicode data
Added support to use persistent HTTP(s) connection for speed improvement, –keep-alive switch
Implemented several optimization switches to speed up the exploitation of SQL injections
Support to parse and test forms on target url, –forms switch
Added switches to brute-force tables names and columns names with a dictionary attack, –common-tables and –common-columns.
MySQL.com, the official website of the database management system of the same name, was today subjected to an attack whereby hackers used SQL injection exploits to gain access to a complete list of usernames and passwords on the site.
News of the attack surfaced when the attackers posted details of the compromise on the Full Disclosure mailing list, publicly listing the contents of database tables used to store member and employee data, but also a small sample of user logins and password hashes.
Owned by Oracle, MySQL is used by millions of websites to store and deliver information, with some of the most popular online services and platforms including WordPress and Joomla utilising the software.
The attack was achieved using “blind SQL injection”, targeting MySQL.com, MySQL.fr, MySQL.de and MySQL.it, but also two Sun domains.
It appears that the attacks were not due to flaws in the MySQL software itself, but flaws in the implementation of their websites.