Page Format refers to the type of scripting language used to create the web page and file extensions. Examples of this are "home" and "new products." On the other hand, keywords refer to the specific content within a page like "jacket" or "social security number." The name of a page can be seen in the browser address bar. The Names/Keywords category focuses on the names of pages and/or keywords to search. The user can select dorks from Names/Keywords, Page Format, and Page Type. There are three categories located within the SQLi Dumper Dork Generator. Click SQL Injection and start the exploiter.ĭorks are search criteria selected by the user. Each phase, in turn, has several steps, and all are easy to understand. This tool uses a 6-phase process to provide the requested information. A business can use SQLi Dumper as part of its cybersecurity program to prevent SQL Injection attacks. A central repository (database) containing personally identifiable information (PII), credit card data, and other information was still a tempting target for hackers. BackgroundĪs SQL became more popular in database design and management, so did its popularity with hackers. It does not promote SQLi Dumper as a "hacking" tool or to be used in illegal or unauthorized activities. This overview aims to support legal and authorized activities undertaken to improve the security of SQL databases. The website also provides SQLi Dumper tutorials and other pertinent information. It can be downloaded through the website. This is an excellent automatic SQL injection tool that scans web applications for SQL injection vulnerabilities. # perl -u noge]# perl ssdp.Individuals interested in performing penetration testing on Structured Query Language (SQL) databases should look at SQLi Dumper. You can add your own table name & column name by editing file called tables.dict & columns.dict. What can we do with create file vuln? we can make a php file as backdoor at the target if we know the directory path. To see if it works or no lets read /tmp/ssdp.txt using load_file function. URL above means we write “Simple SQLi Dumper” into ssdp.txt that locate at /tmp directory. Let’s create some file in /tmp directory. To use load_file you need to convert the /etc/passwd into hexadecimal. It means we can read (load_file) the /etc/passwd file on a target also we can create file at /tmp directory. to inject, we do it manually.Īs you can see at the first time we find magic number you’ll find this line. Why read only? coz this function design just to test if we can read file or no. Now let’s see Read File (read only) & Create File (read only). Column Name string to search: addressįound column with word “address” on table “customer”. # perl -u -d -c noge]# perl -u -d 460store -c address -find I’ll try to search column with keyword “address” it require -c option (column)
#Sqli dumper v.5.1 how to
Now i’ll show you how to use -find option (Search Columns Name) Ok i have show you how to find magic number, table, column and dump data the column using SSDp. # perl -u -t -c, noge]# perl -u -t security -c username,password -dump Now we’ll see information inside that column. security(1): user_id,username,password,admin,last_loginĪha! we got column called “username” and “password”. # perl -u -t noge]# perl -u -t security -column Let’s see column from table called “security”. That is the list of all table in database() Now we use URL that include “c0li” string on it to find table & column. We can see the database information and operation system too. Our magic number is 1 and it will replace with “c0li” string. Null column used for execute our SQL query. | -log file name to save ssdp data (default: ssdp.log) |įirst of all we have to find null column (magic number). | -start row number to begin dumping data | | -f max field to get magic number (default: 123) | | -c column_name (example: id,user,pass,email) | | -d this option should not be used (default: | | -e sql injection end tag (default: “–”) | | -u target with id parameter or sqli url with c0li string | SSDp is an usefull penetration tool to find bugs, errors or vulnerabilities in MySQL database. WE ARE NOT RESPONSIBLE OF ANY DAMAGE AND IMPROPERLY USE OF THIS TOOL. USE THIS TOOL FOR EDUCATION PURPOSE ONLY.