Jump to content

SQLi Dumper v.9.6


Warlord
 Share

Recommended Posts

Virustotal: https://www.virustotal.com/#/file/828d2014a82e9614266472a583d21d9aba18aca64755ec2b2912d2bc49483f79/detection

SQLi Dumper v.9.6 is an excellent, advanced, automatic SQL injection tool for testing links that may contain SQL injection problems in Windows.

This tool is more powerful than the famous Havij SQL injection and has many features including:
-Supports Multi. Online search engine (to find the trajects);
-Automated exploiting and analyzing from a URL list;
-Automated search for data in a bulk URL list;
-Automated analyzer for injections points using URL, POST, Cookies, UserLogin or UserPassword;
-Dumper supports dumping data with multi-threading (databases/tables/columns/fetching data);
-Exploiter supports up to 100x threads;
-Analyzer and Dumper supports up to 50x threads;
-Advanced WAF bypass methods;
-Advanced custom query box;
-Dumper can dump large amounts of data, with greats control of delay each request (multi-threading);
-Easy switch vulnerabilities to vulnerabilities;
-Supports proxies list;
-GeoIP database;
-Internal database;
-Trash System;
-Admin login finder;
-Hash online cracker;
-Reverse IP;
-Standalone .exe (no install).

The SQL Injection Methods that are supported include:
– MySQL
– Union (Integer / String)
– Error (Integer / String)
** Error Methods:
– Double Query
– XPATH – ExtractValue
– XPATH – UpdateXML
– Brute Forcing
– Blind
– Load File
– Load File Scanner
** Illegal Mix Of Collations:
– UnHexHex()
– Binary()
– Cast As Char
– Compress(Uncompress())
– Convert Using utf8
– Convert Using latin1
– Aes_decrypt(aes_encrypt())
– MS SQL
– Union (Integer / String)
– Error (Integer / String)
** Illegal Mix Of Collations:
– SQL_Latin1;
– Cast As Char.
– Oracle
– Union (Integer / String)
– Error (Integer / String)
** Error Methods:
– GET_HOST_ADDRESS
– DRITHSX.SN
– GET;APPINGXPATH.
** Illegal Mix Of Collations:
– Cast As Char.
** Suports TOP N Types:
– ROWUM
– RANK()
– DESE_RANK()
** Analizer detects also:
– MS Access
– PostgredSQL
– Sybase

I wanted to use its dork scanner feature for a specific website, not a random search. But, how?
Use this dork in a dork scanner:
.aspx? & site:samplesite.com
.php?  & site:samplesite.com
.asp?  & site:samplesite.com
.pl?   & site:samplesite.com
.jsp?  & site:samplesite.com
And, it simply fetches the links and automatically scans for SQL injection in those links.

Hidden Content

    Give reaction and reply to this topic to see the hidden content.

  • upvote 13
  • Like 2
  • Thanks 1
  • Haha 1
Link to comment
Share on other sites

  • 4 weeks later...
  • 1 month later...
  • 3 weeks later...
  • 1 month later...
  • 4 weeks later...
  • 1 month later...
  • 2 weeks later...
  • 3 months later...
  • 1 month later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

Board Life Status


Board startup date: October 30, 2017 06:45:19
×
×
  • Create New...