![]() ![]() Not strictly a Perl module, but it helps. You will also need the Metasploit Framework 3 on your box to use the metasploit attack mode, and also a VNC client if you use the VNC payload. To start with we will look at the means of injection which in this case is SQL statements. In order to use sqlninja, the following Perl modules need to be present: For us to be able to counter or prevent SQL Injection we need to look closely at how each type of Injection is implemented to figure out how best to avoid the implemented method. If your AV complains, it is because the Churrasco executable in the tarball is recognized as a virus. $ svn co svn://.net/p/sqlninja/code/ sqlninja-devel To download the latest snapshot, use the following command: Come on, give it a try, show chicks how brave you are, and report some bugs! It is a work-in-progress, not 100% documented, and likely to have several bugs, so not for the faint hearted. This is the hemorrhaging edge version! It supports Powershell stagers with metasploit. ![]() It lacks the data extraction module, but it has been tested a lot more extensively The alpha of the new release, with all the newest cool stuff! Data extraction via WAITFOR and DNS tunnel, plus vbscript-based upload! Download it and find some bugs :) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |