[ad]
We’ve been folowing the development of sqlninja since the early days, it’s growing into a well matured and more polished tool with advanced features.
Sqlninja is a tool written in PERL to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.
Features
- Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, authentication mode)
- Bruteforce of ‘sa’ password, both dictionary-based and incremental
- Privilege escalation to ‘sa’ if its password has been found
- Creation of a custom xp_cmdshell if the original one has been disabled
- Upload of netcat.exe (or any other executable) using only 100% ASCII GET/POST requests, so no need for FTP connections
- TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port that is allowed by the firewall of the target network and use it for a reverse shell
- Direct and reverse bindshell, both TCP and UDP
- DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for a direct/reverse shell, but the DB server can resolve external hostnames
- Evasion techniques, in order to obfuscate the injected code and confuse/bypass signature-based IPS and application firewalls
Fancy going from a SQL Injection to a full GUI access on the DB server? What about extracting password hashes on the fly? Take a few SQL Injection tricks, add a couple of remote shots in the registry to disable Data Execution Prevention, mix with a little Perl that automatically generates a debug script, put all this in a shaker with a Metasploit wrapper, shake well and you have the latest release of sqlninja! See it in action here.
What’s new in 0.2.3?
- A Metasploit3 wrapper, which allows the user to use SQL Injection to execute Metasploit payloads on the remote DB server
- Several other minor improvements
You can download sqlninja 0.2.3 here:
Or read more here.
razta says
Great tool!
Sorry for the double post, again! There should be an edit button, could use cookies to do this.
In the newest version they have integrated it with metasploit and VNC, you can now have access to the SQL server with a complete GUI! Wait till script kiddies get a hold of this! Hopefully admins will now start to think about security when coding.
My SQL injection skills are minimal, so it will definitely come in use (when im legally testing my own SQL server).
Jinesh Doshi says
Why are these tools not available on windows?? So even some dumb heads like me can do a little show off :).
Nico says
This IS a great tool for IT pros. Have you heard of any loopholes it finds if the SQL statements are not concatenated and the input fields are escaped properly?
Jeremy Richards says
Jinesh,
you’ll notice the following in the post above: “Sqlninja is a tool written in PERL to…”
Perl binaries for windows can be found:
perl.com/download.csp#win32
sqlmap.py is also a great tool and written in python. Python binaries for windows can be found:
python.org/ftp/python/2.5.2/python-2.5.2.msi
Jinesh Doshi says
@ Jeremy Richards
Hey Thank you so much. It just didnt click to me :(.
Navin says
razta’s right but I feel tht this tool is both a boon and a bane. N00bs getting their hands on tools like this increases risk to SQL servers.
BTW “Fancy going from a SQL Injection to a full GUI access on the DB server? What about extracting password hashes on the fly? Take a few SQL Injection tricks, add a couple of remote shots in the registry to disable Data Execution Prevention, mix with a little Perl that automatically generates a debug script, put all this in a shaker with a Metasploit wrapper, shake well and you have the latest release of sqlninja!”
Nice play of words!!