Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Showing posts with label SQL Injection. Show all posts
Showing posts with label SQL Injection. Show all posts

Monday, August 6, 2012

BSQL Hacker : Automated SQL Injection Framework Tool

It's easy to use for beginners and provide great amount of customisation and automation support for experienced users. Features a nice metasploit alike exploit repository to share and update SQL Injection exploits.

BSQL Hacker is an automated SQL Injection Framework / Tool designed to exploit SQL injection vulnerabilities virtually in any database.

BSQL Hacker aims for experienced users as well as beginners who want to automate SQL Injections (especially Blind SQL Injections).

Videos

Download

  • New version is out, it's mostly bug fixed, CLICK HERE to download.

Screenshot


Key Features

  • Easy Mode
    • SQL Injection Wizard
    • Automated Attack Support (database dump)
      • ORACLE
      • MSSQL
      • MySQL (experimental)
  • General
    • Fast and Multithreaded
    • 4 Different SQL Injection Support
      • Blind SQL Injection
      • Time Based Blind SQL Injection
      • Deep Blind (based on advanced time delays) SQL Injection
      • Error Based SQL Injection
    • Can automate most of the new SQL Injection methods those relies on Blind SQL Injection
    • RegEx Signature support
    • Console and GUI Support
    • Load / Save Support
    • Token / Nonce / ViewState etc. Support
    • Session Sharing Support
    • Advanced Configuration Support
    • Automated Attack mode, Automatically extract all database schema and data mode
  • Update / Exploit Repository Features
    • Metasploit alike but exploit repository support
    • Allows to save and share SQL Injection exploits
    • Supports auto-update
    • Custom GUI support for exploits (cookie input, URL input etc.)
  • GUI Features
    • Load and Save
    • Template and Attack File Support (Users can save sessions and share them. Some sections like username, password or cookie in the templates can be show to the user in a GUI)
    • Visually view true and false responses as well as full HTML response, including time and stats
  • Connection Related
    • Proxy Support (Authenticated Proxy Support)
    • NTLM, Basic Auth Support, use default credentials of current user/application
    • SSL (also invalid certificates) Support
    • Custom Header Support
  • Injection Points (only one of them or combination)
    • Query String
    • Post
    • HTTP Headers
    • Cookies
  • Other
    • Post Injection data can be stored in a separated file
    • XML Output (not stable)
    • CSRF protection support (one time session tokens or asp.net viewstate ort similar can be used for separated login sessions, bypassing proxy pages etc.)

Sunday, October 30, 2011

Hack website completely using SQL Injection - Video Tutorial

I have posted a complete  tutorial about How to Hack Websites using SQL Injection . But man guys are having problem using SQL so here's a video tutorial in which I have hacked a website completely using SQL Injection. Just follow this simple steps and hack that site . If having any problem then ask in the comments. Make sure to write the code as it is,particularly take much care of spaces as they are really confusing where we have to add space and where we dont need to add space.

Hack website completely using SQL Injection - Part 1

  • First part of Video Tutroial :


Hack website completely using SQL Injection - Part 2

  • Second part of Video Tutroial :


NOTE : This tutorial is only for educational purposes and the team of HWS is not responsible in any way for how this information is used, use it at your own risk.

Thursday, February 3, 2011

Transfer MS Access Database To MySQL

Transferring database from one system to another is always a headache regardless of how big or small the migration scale is. Therefore, database managers, generally, look out for a simple tool which can perform export and import operations with all the variations involved. If you’re planning to migrate data from Access to MySql, you’d probably have a lot methods in mind to port databases. Before implementing any of them, try MS Access to MySQL. It is an ingeniously simple utility to quickly port Access database to user-defined MySql database.  While it supports a wide range of database formats, including, MDB, MDE, ACCDB, and ACCDE, it shows MySql database hierarchy to choose the destination database path. Furthermore, password protected (encrypted) databases can also be exported on the fly without having to decrypt them.
It allows two transfer modes – Direct transfer and Dump file creation. In direct transfer mode, you need to enter the host address, port, DB username and password along with DB name where data has to be directly ported, optionally, you can choose a local location to create SQL dump file for importing it later.

It has a simple wizard with 3-4 steps for transferring data. In the first step specify source database, second step refers to choosing transfer type. Depending upon the type, it will ask you to choose options in latter steps. In direct transfer mode, enter the all required information for establishing connection, specify DB name, and pick out the storage engine.
ss_destinationdatabase
In the last step of direct transfer, it will ask you to choose some database transfer-related options, such as, Transfer indexes and records, Include column list in INSERT, create tables, and so on. Depending upon the requirements, select the appropriate options and click Run Now to begin the process.
ss_options
Creating Sql Dump file needs nothing except specifying the target location where you want to save the Sql file. After the transfer is completed, it is recommended to thoroughly verify the the database migration including all the included tables with indexes to prevent any conflicts in the future. It works on Windows XP, Windows Vista, and Windows 7.

Download MS Access to MySQL

Sunday, May 23, 2010

Hack websites using Auto SQL I Helper

In the recent posts we have seen the hacking of a site using manual SQL injection,which is essential to know the basics of SQL.Now we are going to check advanced SQL INJECTION.


At the begening "SQLIHelperV.2.7" is a tool that will hack vulnerable websites using SQL injection. You don't have to spend hours and hours trying to find your way in a website and trying hundreds of combinations and codes to hack a website.
This tool will do it all by itself. You only have to tell her what do and where to look.


Lets start.
first you need to find the potential website that you think it might be possible to hack it. Remember that some websites are simply unhackable.


After you find your website ( better to end with "article.php?id=[number]" ) example: "http://encycl.anthropology.ru/article.php?id=1"




Check if your website can be hacked by trying to go this address :
http://www.domain.com/article.php?id=&amp;amp;#39;1 <------ notice the ' before the number 1.


you should get this message:


Query failedYou have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\'1 ORDER BY lastname' at line 1 SELECT * FROM person_old WHERE id=\'1 ORDER BY lastname


This mean that this website can be hacked because you get an error.


Now open your SQL I Helper V.2.7
and write the link :
http://www.domain.com/article.php?id=1 <---- without the '


and press the inject button.


Now you should wait until the tool finish searching for columns . Time may vary depending on your connection speed , your pc speed , and the number of columns in the website.


Make sure that the website support union otherwise the injection won't work.


Now select any element from the "database name" box and press the "Get tables" button ,


then select any element from the "table name" box and press the "Get columns" button


then select any elements you want from the "columns name" box and press "Dump Now"


After clicking "Dump Now" , u will see some hashes


Now copy the hash on a peace of paper and go to this website:


http://www.md5crack.com/


enter the hash and press the button "Crack that hash baby!" and you should get the source of the hash.

Online Sites Helpful for SQL Injection

In the last post we have seen how to Hack an Online Site using SQL Injection and then Some Latest Commands for SQL Injection.Now we are going to see some sites which will help in SQL Injection and help us to find the vulnerable sites and also the number of columns ,tables etc.

1) SQL Vulnerability Finder

  • You can find whether the site iz vulnerable for SQL Injection or not through this link
Link : http://sql.wehostsite.com/

2) SQL vulnerability finder script

After finding whether the site is vulnerable or not,just enter the vulnerable site url in the below link and it will return you the following :
  • Order by
  • Selection Id
  • Version
  • Database name

SQL commands [useful for Injection]

In the last post we have seen how to Hack an Online Site using SQL Injection. This technique is quite easy to use and i think its best technique but it is not applicable on new sites using cpanel. As you have understand the whole technique now i am introducing some useful commands related to SQL injection :

Latest Sql Injection Commands

  • ABORT -- abort the current transaction
  • ALTER DATABASE -- change a database
  • ALTER GROUP -- add users to a group or remove users from a group
  • ALTER TABLE -- change the definition of a table
  • ALTER TRIGGER -- change the definition of a trigger
  • ALTER USER -- change a database user account
  • ANALYZE -- collect statistics about a database
  • BEGIN -- start a transaction block
  • CHECKPOINT -- force a transaction log checkpoint
  • CLOSE -- close a cursor
  • CLUSTER -- cluster a table according to an index
  • COMMENT -- define or change the comment of an object
  • COMMIT -- commit the current transaction
  • COPY -- copy data between files and tables
  • CREATE AGGREGATE -- define a new aggregate function
  • CREATE CAST -- define a user-defined cast
  • CREATE CONSTRAINT TRIGGER -- define a new constraint trigger
  • CREATE CONVERSION -- define a user-defined conversion
  • CREATE DATABASE -- create a new database
  • CREATE DOMAIN -- define a new domain
  • CREATE FUNCTION -- define a new function
  • CREATE GROUP -- define a new user group
  • CREATE INDEX -- define a new index
  • CREATE LANGUAGE -- define a new procedural language CREATE OPERATOR -- define a new operator
  • CREATE OPERATOR CLASS -- define a new operator class for indexes
  • CREATE RULE -- define a new rewrite rule
  • CREATE SCHEMA -- define a new schema
  • CREATE SEQUENCE -- define a new sequence generator
  • CREATE TABLE -- define a new table
  • CREATE TABLE AS -- create a new table from the results of a query
  • CREATE TRIGGER -- define a new trigger
  • CREATE TYPE -- define a new data type
  • CREATE USER -- define a new database user account
  • CREATE VIEW -- define a new view
  • DEALLOCATE -- remove a prepared query
  • DECLARE -- define a cursor
  • DELETE -- delete rows of a table
  • DROP AGGREGATE -- remove a user-defined aggregate function
  • DROP CAST -- remove a user-defined cast
  • DROP CONVERSION -- remove a user-defined conversion
  • DROP DATABASE -- remove a database
  • DROP DOMAIN -- remove a user-defined domain
  • DROP FUNCTION -- remove a user-defined function
  • DROP GROUP -- remove a user group
  • DROP INDEX -- remove an index
  • DROP LANGUAGE -- remove a user-   DROP TYPE -- remove a user-defined data type
  • DROP USER -- remove a database user account
  • DROP VIEW -- remove a view
  • END -- commit the current transaction
  • EXECUTE -- execute a prepared query
  • EXPLAIN -- show the execution plan of a statement
  • FETCH -- retrieve rows from a table using a cursor
  • GRANT -- define access privileges
  • INSERT -- create new rows in a table
  • LISTEN -- listen for a notification
  • LOAD -- load or reload a shared library file
  • LOCK -- explicitly lock a table
  • MOVE -- position a cursor on a specified row of a table
  • NOTIFY -- generate a notification
  • PREPARE -- create a prepared query
  • REINDEX -- rebuild corrupted indexes
  • RESET -- restore the value of a run-time parameter to a default value
  • REVOKE -- remove access privileges
  • ROLLBACK -- abort the current transaction
  • SELECT -- retrieve rows from a table or view
  • SELECT INTO -- create a new table from the results of a query
  • SET -- change a run-time parameter
  • SET CONSTRAINTS -- set the constraint mode of the current transaction
  • SET SESSION AUTHORIZATION -- set the session user identifier and the current user identifier of the current session
  • SET TRANSACTION -- set the characteristics of the current transaction
  • SHOW -- show the value of a run-time parameter
  • START TRANSACTION -- start a transaction block
  • TRUNCATE -- empty a table
  • UNLISTEN -- stop listening for a notification
  • UPDATE -- update rows of a table
  • VACUUM -- garbage-collect and optionally analyze a database 
Here you can check some Online Sites helpful for SQL Injection .

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers