SQLsus – MySql Injection Tutorial

SQL injection is the most common and most dangerous web application hacking technique in SQL injection a hacker take advantages of misconfiguration and poor coding of SQL. SQL injection will take an attacker to the important database that might contain credit card information, administrative information and more. There are so many tools are available for SQL injection, you can use w3af, nikto and others to find the sql vulnerability on a web application. Backtrack 5 also contain so many tools like sqlmap.

What Is SQLsus?

sqlsus is an open source MySQL injection and takeover tool, written in perl.
Via a command line interface, you can retrieve the database(s) structure, inject your own SQL queries (even complex ones), download files from the web server, crawl the website for writable directories, upload and control a backdoor, clone the database(s), and much more… 
 
Whenever relevant, sqlsus will mimic a MySQL console output.sqlsus focuses on speed and efficiency, optimising the available injection space, making the best use (I can think of) of MySQL functions. 
 
It uses stacked subqueries and an powerful blind injection algorithm to maximise the data gathered per web server hit. Using multithreading on top of that, sqlsus is an extremely fast database dumper, be it for inband or blind injection. 
 
If the privileges are high enough, sqlsus will be a great help for uploading a backdoor through the injection point, and takeover the web server.
It uses SQLite as a backend, for an easier use of what has been dumped, and integrates a lot of usual features (see below) such as cookie support, socks/http proxying, https.

Download

SQLsus- MySQL injection Tutorial

takeover : MySQL 4, quotes allowed, FILE privilege, inband injection.
inband : MySQL 5, no quotes allowed, inband injection.

blind : MySQL 5, no quotes allowed, blind injection.





Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...

What is Ethical Hacking, how to be an Ethical Hacker

Hacking is the process of discovering vulnerabilities in a system and using these found vulnerabilities by gaining unauthorized access into the system to perform...

Basic steps to ensure security Online!

Security concerns are growing day by day due to the growing interconnectivity and technology. Drastic things can happen if you be a little careless...