Bsqlbf V2 – Blind SQL Injection Brute Forcer Tool

The New Acunetix V12 Engine


There are quite a lot of SQL Injection Tools available and now there is one more to add to the stable for testing – Bsqlbf V2, which is a Blind SQL Injection Brute Forcer.

The original tool (bsqlbfv1.2-th.pl) was intended to exploit blind sql injection against a mysql backend database, this new version supports blind sql injection against the following databases:

  • MS-SQL
  • MY-SQL
  • PostgreSQL
  • Oracle

It supports injection in string and integer fields. The feature which separates this tool from all other sql injection tools is that it supports custom SQL queries to be supplied with the -sql switch.

It supports 2 modes of attack:

  1. Type 0: Blind SQL Injection based on True And Flase response
  2. Type 1: Blind SQL Injection based on True And Error Response(details)

You can download Bsqlbf V2 here:

bsqlbf-v2.1.zip

Or read more here.

Posted in: Database Hacking, Hacking Tools, Web Hacking

, , , , , , , , ,


Latest Posts:


Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.
testssl.sh - Test SSL Security Including Ciphers, Protocols & Detect Flaws testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
testssl.sh is a free command line tool to test SSL security, it checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more.
Four Year Old libSSH Bug Leaves Servers Wide Open Four Year Old libssh Bug Leaves Servers Wide Open
A fairly serious 4-year old libssh bug has left servers vulnerable to remote compromise, fortunately, the attack surface isn't that big as neither OpenSSH or the GitHub implementation are affected.
CHIPSEC - Platform Security Assessment Framework CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.


8 Responses to Bsqlbf V2 – Blind SQL Injection Brute Forcer Tool

  1. grav June 28, 2008 at 8:07 pm #

    How exactly does SQL Injection work? Is it anything like php injection?

    DO you usually have to enter the malicious code into a form?

    So what happens when the form checks against a database and the code is executed, will it cause a lock up? An opening for further intrusion? Full access?

    I may sound like a n00b, but I’m pretty sure others have the same question and would like to know more about SQL Injection.

    THANKS

    ( I know the answers could be found on google or wikipedia, but it helps to have real people discuss things)

  2. Bogwitch June 29, 2008 at 3:49 pm #

    If a site is suceptible to SQL injection, one of the entry forms on a page might accept extra SQL commands within the form, assuming input validation is weak.

    The input will normally take the form of a closing quotation mark (‘) followed by a logic operator (1=1 or some other) from there it would depend on what the attacker wants to achieve. Some versions of SQL will allow for execution of commands, believe it or not!

    Mostly, you will be dumping table contents, enumerating the database etc. It may well be possible to dump passwords if they are stored in plaintext, or password hashes for offline cracking.

    Going back to code execution, it may be possible to run commands in the context as the server, if the server is running with system privs, it will be possible to run system commands such as ‘net user add …..’ (for a Windows box) This will depend on the security of the box, the context that the server runs in, input code validation, the version of SQL running, etc.

    Hope that helps!

  3. Sandeep Nain July 3, 2008 at 6:55 am #

    @grav, In simple words SQL Injection is all about modifying the underlying SQL statements to get results which are not supposed to be displayed to the user..

    If their is a URL. http://www.estore.com/showItem=25
    which actually is creating a query “select * from items where id=25”

    You can inject it as follows:

    select * from items where id=25;drop table items;

    if the input is not sanitized, the db server will run sql statements and the second one will drop the items table

  4. Changlinn July 3, 2008 at 6:56 am #

    XKCD put it best: http://xkcd.com/327/
    But yeah basically un-sanitised entries, can cause havok.

  5. Sandeep Nain July 3, 2008 at 6:57 am #

    By The Way, its a very nice tool for Blind SQLi.

    I used its previous version too and found this one far better than that.
    Thanks for introducing to it darknet.

    @grav

    Blind SQL Injection is where you don’t actually get to see the results of your injected SQL.

  6. grav July 3, 2008 at 7:48 pm #

    @ Changlinn

    Thank you for the webcomic
    made my day

    Makes me feel like a geek just for getting it though : )
    Thanks guys
    I was able to understand thanks to you

  7. Changlinn July 6, 2008 at 2:02 pm #

    Grav: Glad to be of help.
    Pardon my ignorance, but what is the point of not seeing the results, you want to see what and where so you know who to slap and what to plug.

  8. Feeder September 10, 2008 at 5:24 am #

    I am an amateur who is really keen to find out more, I have a question which I will be very grateful if answered.

    Assuming that the databased is sanitized does that mean that sql injections are now useless?

    For example

    f ((key==null) || (key==0) || (key==8) ||
    (key==9) || (key==13) || (key==27) )
    return true;

    else if (((“abcdefghijklmnopqrstuvwxyz0123456789_@.-“).indexOf(keychar) > -1))
    return true;
    else
    return false;

    Since I am unable to type sql functions is it foolproof