exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 66 of 66 RSS Feed

Files from Bernardo Damele

Email addressbernardo.damele at gmail.com
First Active2006-12-15
Last Active2024-01-04
Keimpx SMB Credential Checker 0.2
Posted Feb 12, 2010
Authored by Bernardo Damele | Site code.google.com

Keimpx is a tool to check the usefulness of credentials across a network over SMB.

tags | tool
systems | unix
SHA-256 | cb076ae0382c319ba7868b91e0b87f391f2c0860288321aed4da9e0b1ffb4a76
SQLMAP - Automatic SQL Injection Tool
Posted Jul 28, 2009
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: Adapted Metasploit wrapping functions to work with latest 3.3 development version too. Adjusted code to make sqlmap 0.7 to work again on Mac OSX too. Various other tweaks and improvements.
tags | web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | 064615194602c26710703b3deed8a2816ed54cc60be8158ba43dfffed85c1e3b
SQLMAP - Automatic SQL Injection Tool
Posted Apr 22, 2009
Authored by Bernardo Damele | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Changes: New features as described at the presentation given at Black Hat Europe.
tags | web, overflow, arbitrary, vulnerability, sql injection
systems | unix
SHA-256 | facfe914f0de39c5a38ffe08fd1294e7b88ddeab5eeeaa9496833b49f71fa5b8
Advanced SQL Injection To Operating System Full Control
Posted Apr 10, 2009
Authored by Bernardo Damele

Whitepaper called Advanced SQL Injection To Operating System Full Control.

tags | paper, sql injection
SHA-256 | d7ae79b18cb503635cf4e7952bd054354bf38dbbb5cf70fa1ed8ecb133293568
SQLMAP - Automatic SQL Injection Tool
Posted Feb 4, 2009
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an open source command-line automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.

Changes: Major enhancement to make the comparison algorithm work properly. Major speed increase in DBMS basic fingerprint. Added internal support to forge CASE statements. Various other additions and improvements.
tags | web, vulnerability, sql injection, python
systems | unix
SHA-256 | deea059d31091c2d800c35dbd47b454d15ccca8ffbad0c5ba4ba9e1b58746265
PostgreSQL UDF For Command Execution
Posted Jan 25, 2009
Authored by Bernardo Damele | Site bernardodamele.blogspot.com

Patched source code for lib_postgresqludf_sys that allows for command execution on postgres with user defined functions.

tags | library
SHA-256 | 7e2243d51f00284725bd535fed895dcbb3fd66596981f866c66e9deabc5992ae
Command Execution With A MySQL UDF
Posted Jan 21, 2009
Authored by Bernardo Damele | Site bernardodamele.blogspot.com

Patched source code for lib_mysqldudf_sys that allows for command execution on mysql with user defined functions. Adds a sys_eval() UDF to return the standard output of the command executed.

tags | library
SHA-256 | 4b78254426b12bb3fdc6dcedbee863edc282799d0c7d4236f2652c31b3b1ef9b
SQLMAP - Automatic SQL Injection Tool
Posted Dec 22, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

Changes: Multiple major bug fixes and a handful of minor fixes.
tags | web, vulnerability, sql injection, python
systems | unix
SHA-256 | fd47be9ac455b207a54a975f54d8a5e80fbc48844992b666e5c976e55a1f96d7
PSA08-010.txt
Posted Nov 14, 2008
Authored by Bernardo Damele | Site portcullis-security.com

Portcullis Security Advisory - An information disclosure vulnerability exists in the manner that Microsoft LDAP server responds when binding to the LDAP server. In the case when an invalid password is provided, the server will respond with result code 49 (invalidCredentials) and an error message. A different error message is returned if an invalid username is provided.

tags | advisory, info disclosure
SHA-256 | 10233417213d8d65b5b5a8767722479605da8d41d2277ed5635cd913f03bc3e7
SQLMAP - Automatic SQL Injection Tool
Posted Nov 5, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

Changes: Multiple major bug fixes and a handful of minor fixes.
tags | web, vulnerability, sql injection, python
systems | unix
SHA-256 | 88fc937ae2b316657d98efae05bba9f15d3823c3a78d7a9f4c5a244f2333ddad
SQLMAP - Automatic SQL Injection Tool
Posted Oct 21, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

Changes: Major bug fix to blind SQL injection bisection algorithm to handle an exception. Added a Metasploit Framework 3 auxiliary module to run sqlmap. Other additions and bug fixes.
tags | web, vulnerability, sql injection, python
systems | unix
SHA-256 | d6b7e45015e2226774d298a56d321bed91d79bc32fb419ae257be2f1063f03eb
SQLMAP - Automatic SQL Injection Tool
Posted Sep 3, 2008
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic SQL injection tool developed in Python. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specific DBMS tables/columns, run his own SQL SELECT statement, read specific files on the file system and much more.

tags | web, vulnerability, sql injection, python
systems | unix
SHA-256 | 3c24955ec014ce95d653b0dc141b0bb3bd940d7d9792bb6de87c749c6713f04c
SQLMAP - Automatic SQL Injection Tool
Posted Nov 5, 2007
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of this project is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.

Changes: Added support for Oracle database management system. Extended inband SQL injection functionality. Added some support and a fuzzer. Many other changes, see the changelog.
tags | remote, web, vulnerability, sql injection, python
systems | unix
SHA-256 | 4c1c491de3c1ba151bbb4e0d7c5b72b4445beca08eab802281cc7bcc7be7555e
SQLMAP - Automatic SQL Injection Tool
Posted Jun 15, 2007
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of this project is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.

tags | remote, web, vulnerability, sql injection, python
systems | unix
SHA-256 | 79a390525330bfc0ba75ff322b46363ad822b19c9fe144aaa840869108e5a04a
SQLMAP - Automatic SQL Injection Tool
Posted Jan 22, 2007
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic blind SQL injection tool capable of enumerating entire remote databases, performing an active database fingerprint and much more. The aim of this project is to implement a fully functional database mapper tool which takes advantages of web application security flaws.

tags | remote, web, sql injection
systems | unix
SHA-256 | e120df541896d4a34c341dc9469b132340791558f489364d3953cfeeeaa5b7cb
SQLMAP - Automatic SQL Injection Tool
Posted Dec 15, 2006
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic blind SQL injection tool capable of enumerating entire remote databases, performing an active database fingerprint and much more. The aim of this project is to implement a fully functional database mapper tool which takes advantages of web application security flaws.

tags | remote, web, sql injection
systems | unix
SHA-256 | 0853916caa03e6bd3a882a8a311e991ff641b37315415096cb6755d48f8b090d
Page 3 of 3
Back123Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close