{"id":365,"date":"2006-10-28T04:18:23","date_gmt":"2006-10-28T04:18:23","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/10\/bobcat-sql-injection-tool-based-on-data-thief\/"},"modified":"2010-06-21T19:00:55","modified_gmt":"2010-06-21T18:00:55","slug":"bobcat-sql-injection-tool-based-on-data-thief","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/10\/bobcat-sql-injection-tool-based-on-data-thief\/","title":{"rendered":"BobCat SQL Injection Tool based on Data Thief"},"content":{"rendered":"

<\/p>\n

BobCat is a tool to aid a security consultant in taking full advantage of SQL injection vulnerabilities. It is based on a tool named “Data Thief” that was published as PoC by appsecinc. BobCat can list the linked severs, database schema, and allow the retrieval of data from any table that the current application user has access to.<\/p>\n

The methods that BobCat incorprates are based on those discussed in the following papers:<\/p>\n

advanced sql injection<\/a>
\n
more advanced sql injection<\/a>
\n
advanced sql injection<\/a>
\n
manipulating sql server usig sql injection<\/a><\/p>\n

I suggest if you are interested in SQL injection at all, you read all of the above papers.<\/p>\n

BobCat Requirements<\/strong><\/p>\n

    \n
  1. Windows OS (Tested on XP SP2)<\/li>\n
  2. Access to MS SQL server\/MSDE2000 (Tested on MSDE2000)<\/li>\n
  3. .Net Framework 2.0<\/li>\n<\/ol>\n

    Read more about BobCat here:<\/p>\n

    Northern Monkee – BobCat<\/a><\/p>\n

    Download BobCat here:<\/p>\n

    BobCat Alpha 0.3<\/a><\/p>\n

    Some tools to use with BobCat can be found here:<\/p>\n

    <\/p>\n

    BobCat Tools<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

    BobCat is a tool to aid a security consultant in taking full advantage of SQL injection vulnerabilities. It is based on a tool named “Data Thief” that was published as PoC by appsecinc. BobCat can list the linked severs, database schema, and allow the retrieval of data from any table that the current application user […]<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2,9,15],"tags":[37,439,1235,396],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Darknet","author_link":"https:\/\/www.darknet.org.uk\/author\/darknet\/"},"_links":{"self":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/365"}],"collection":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":0,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/365\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/media?parent=365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/categories?post=365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/tags?post=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}