SQL Injection Takeover Tool (MySQL & MSSQL

aNgeL

Well-known member
Member
Joined
11 yrs. 3 mth. 21 days
Messages
1,624
Reaction score
9,389
Age
35
Wallet
0$
Shoryuken - SQL Injection Takeover Tool (MySQL & MSSQL)


Aimed at easy and fast hacking, shoryuken is a linux bash tool designed to get full control of poorly configurated web applications with backend DBMS in the same machine. In its current version, it uses SQL injection techniques to own MYSQL and MSSQL hosts when they run as OS user ROOT with application user having file privileges (Linux MySQL) or as DB sysadmin user with DB running as OS user SYSTEM (Windows MSSQL). It is done using the same unique HTTP request, the shoryuken (that means "rising dragon punch" in japanese).

Takeover is pretty straightforward with a single request issued to open a "custom shell" on Windows using xp_cmdshell output redirected to a file at default web server root (c:\inetpub\wwwroot) and on Linux using a PHP one line web shell with sudo also at default web server root (/var/www).

The custom shell is provided using default HTTP port 80 (it will be always there) without need to run or download anything and/or relying on firewall's policy.

Shoryuken needs curl installed (Debian-like systems: apt-get install curl).

Shoryuken only exploits SQL injection, you need to first find this kind of vulnerability on target using another tool or method.

Shoryuken now scans hosts, searching for top SQL injection entry points (according to @VulnSites) therefore increasing its mass detection rate to punch vulnerability.

OBS: while there are few systems in these conditions (most likely on internal networks), the vulnerable ones can be easily hacked with shoryuken.




Usage:

./shoryuken1.5 [OPTION] {TARGET | INPUT_FILE} {OUTPUT_FILE}
=> Rearrange target URL if needed to put vulnerable parameter always at the end.



Options:

-h help
-i interactive mode
-p direct punch
-t test mode
-s scan from list
-l test from list


Examples:

./shoryuken1.5 -i
./shoryuken1.5 -p "192.168.0.2/test.asp?id=1"
./shoryuken1.5 -p "vuln-site.net/home/news.php?info=text&vuln_param=11230"
./shoryuken1.5 -t "
Please, Log in or Register to view URLs content!
"
./shoryuken1.5 -s hosts.txt mytargets.txt
./shoryuken1.5 -l mytargets.txt vulnerables.txt


Advantages:


- Gets root/system almost instantly;
- Scans and tests multiple targets;
- Very simple to use;
- Very small (just 9k) e portable;
- Can be easily used in tiny linux systems like mobile ones;
- Pwns MySQL and MSSQL systems at once;
- No need to download/upload anything to target;
- No need for an extra open port on machine or firewall;
- No need for password(s) stored into database;
- No need for privilege escalation;
- Can be easily used when pivoting over linux machines;
- Minimum footprinting in Test Mode (1 request);
- Uses filter bypass techniques like hex converting and HPP;
- Uses statistics from @VulnSites project to improve detection rate;
- Auto cleaning (except for logs);
- Fast Hollywood-style hacking, perfect for a live demonstration.



Download:

Code:
Please, Log in or Register to view codes content!
 
Paid adv. expire in 2 months
CLICK to buy Advertisement !
westernunion carding Verified & Trusted WesternUnion | MoneyGram | Bank - Transferring [299$ BTC for 2000$ WU]
electronics carding Verified & Trusted Electronics Carding, Carding iPhone, Samsung Carding, MacBook Carding, Laptops Carding

Biortosh

V.I.P
V.I.P
Joined
11 yrs. 7 mth.
Messages
2,571
Reaction score
8,720
Wallet
0$
Thanks for such a nice tool
 
Top Bottom