fbpx

SQLsus – MySql Injection Tutorial

SQL injection is the most common and most dangerous web application hacking technique in SQL injection a hacker take advantages of misconfiguration and poor coding of SQL. SQL injection will take an attacker to the important database that might contain credit card information, administrative information and more. There are so many tools are available for SQL injection, you can use w3af, nikto and others to find the sql vulnerability on a web application. Backtrack 5 also contain so many tools like sqlmap.

What Is SQLsus?

sqlsus is an open source MySQL injection and takeover tool, written in perl.
Via a command line interface, you can retrieve the database(s) structure, inject your own SQL queries (even complex ones), download files from the web server, crawl the website for writable directories, upload and control a backdoor, clone the database(s), and much more… 
 
Whenever relevant, sqlsus will mimic a MySQL console output.sqlsus focuses on speed and efficiency, optimising the available injection space, making the best use (I can think of) of MySQL functions. 
 
It uses stacked subqueries and an powerful blind injection algorithm to maximise the data gathered per web server hit. Using multithreading on top of that, sqlsus is an extremely fast database dumper, be it for inband or blind injection. 
 
If the privileges are high enough, sqlsus will be a great help for uploading a backdoor through the injection point, and takeover the web server.
It uses SQLite as a backend, for an easier use of what has been dumped, and integrates a lot of usual features (see below) such as cookie support, socks/http proxying, https.

Download

SQLsus- MySQL injection Tutorial

takeover : MySQL 4, quotes allowed, FILE privilege, inband injection.
inband : MySQL 5, no quotes allowed, inband injection.

blind : MySQL 5, no quotes allowed, blind injection.





Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What are Online Casinos doing to be as Safe and Secure as Possible?

Online casinos have continued to increase in popularity over recent years as more and more gamblers have turned to virtual options to further enhance...

Reconnaissance for Bug Bounty Hunters & Pentesters

New to the bug bounty and confused about where to start? Worry not! This reconnaissance for bug bounty hunters guides you to take the...

Access & Manage Android Phone Remotely – L3MON Tutorial

There is software available, like Metasploit, to gain remote access to any android phone. But other than that, we have the L3MON tool (A...

How to Hide Shellcode Behind Closed Port?

Every company has a variety of scanners for analyzing its network and identifying new or unknown open ports. It's unthinkable to disguise the potentially...