xSQLScanner – Database Password Cracker & Security Audit Tool For MS-SQL & MySQL

Use Netsparker


xSQL Scanner is a advanced SQL audit tool that allows users to find weak passwords and vulnerabilities on MS-SQL and MySQL database servers.

The objective of xSQLScanner is to assist the Security Analyst or Penetration Tester in auditing the security of MS-SQL and MySQL database servers.

xSQLScanner

Features

  • Test for weak password fast;
  • Test for wear/user passwords;
  • Wordlist option;
  • Userlist option;
  • Portscanner
  • Range IP Address audit and more.

Windows – xsqlscanner-1.2.zip
Linux – xsqlscan-mono.tgz

Or read more here.

Posted in: Database Hacking, Hacking Tools

, , ,


Latest Posts:


Intercepter-NG - Android App For Hacking Intercepter-NG – Android App For Hacking
Intercepter-NG is a multi functional network toolkit including an Android app for hacking, the main purpose is to recover interesting data from the network stream and perform different kinds of MiTM attacks.
dcipher - Online Hash Cracking Using Rainbow & Lookup Tables dcipher – Online Hash Cracking Using Rainbow & Lookup Tables
dcipher is a JavaScript-based online hash cracking tool to decipher hashes using online rainbow & lookup table attack services.
HTTP Security Considerations - An Introduction To HTTP Basics HTTP Security Considerations – An Introduction To HTTP Basics
HTTP is ubiquitous now with pretty much everything being powered by an API, a web application or some kind of cloud-based HTTP driven infrastructure. With that HTTP Security becomes paramount and to secure HTTP you have to understand it.
Cangibrina - Admin Dashboard Finder Tool Cangibrina – Admin Dashboard Finder Tool
Cangibrina is a Python-based multi platform admin dashboard finder tool which aims to obtain the location of website dashboards by using brute-force, wordlists etc.
Enumall - Subdomain Discovery Using Recon-ng & AltDNS Enumall – Subdomain Discovery Using Recon-ng & AltDNS
Enumall is a Python-based tool that helps you do subdomain discovery using only one command by combining the abilities of Recon-ng and AltDNS.
RidRelay - SMB Relay Attack For Username Enumeration RidRelay – SMB Relay Attack For Username Enumeration
RidRelay is a Python-based tool to enumerate usernames on a domain where you have no credentials by using a SMB Relay Attack with low privileges.


7 Responses to xSQLScanner – Database Password Cracker & Security Audit Tool For MS-SQL & MySQL

  1. cypherinfo February 16, 2012 at 1:27 pm #

    What is the way to decipher a password as you may see it in a mysql table from MD5?

    Thank you.

  2. Bogwitch February 17, 2012 at 10:01 am #

    You can’t decipher an MD5 hash. What you can do is generate hashes from known plaintext to see if they match the MD5. Whether that is generated from a dictionary, brute force or pre-computed rainbow tables is up to you.
    for a good video that explains password hashing, go here http://www.youtube.com/watch?v=FYfMZx2hy_8

    • cypherinfo February 19, 2012 at 11:49 am #

      Thank you for your interest; great video! One thing only: what is the exact term used for the algorithm: “saw”, “aught”?

      Thank you.

  3. D3F February 19, 2012 at 10:45 am #

    4share was verry slow overhere. So i post a mirror on Docsbird.com

    http://docsbird.com/?p=getfile&id=49da0bbc5d782dd140623fa735f9fd94c9411956

  4. Mr H February 23, 2012 at 10:55 pm #

    Thanks for posting this. DB security for some reason is consistently ignored in most organizations. Having an auditing tool to ensure the security of data warehouses is extremely important.

  5. infodox March 25, 2012 at 3:16 pm #

    Not entirely how much this differs from a sexed-up nmap/hydra combination, but it is still good to have a “clicky” tool – especially when doing a demo for an idiot CSO. I am not sure though… Does this have any serious performance benefits compared to hydra or ncrack?

    • Darknet March 26, 2012 at 7:21 am #

      Honestly not sure how well this would scale for large audits, I haven’t tested it extensively.

      I’d be interested if anyone has any feedback though.