{"id":552,"date":"2007-07-13T08:47:30","date_gmt":"2007-07-13T08:47:30","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2007\/07\/fg-injector-sql-injection-proxy-tool\/"},"modified":"2015-09-09T19:40:04","modified_gmt":"2015-09-09T11:40:04","slug":"fg-injector-sql-injection-proxy-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2007\/07\/fg-injector-sql-injection-proxy-tool\/","title":{"rendered":"FG-Injector – SQL Injection & Proxy Tool"},"content":{"rendered":"

FG-Injector Framework is a set of tools designed to help find SQL injection vulnerabilities in web applications, and help the analyst assess their severity. It includes a powerful proxy feature for intercepting and modifying HTTP requests, and an inference engine for automating SQL injection exploitation.<\/p>\n

Often web developers think that by disabling error messages in their code, SQL injection vulnerabilities stop being dangerous. When a SQL injection vulnerability doesn’t return errors messages it is known as a Blind Injection. The truth is that Blind Injections are just as dangerous as regular SQL Injections. By carefully selecting SQL sentences to inject, an attacker can retrieve information from the database of the vulnerable web application, one bit at a time. The end result is that the attacker can obtain the same data through the Blind SQL Injection that he\/she would obtain from a regular -non-blind- SQL Injection.<\/p>\n