Web Application Testing with Matrixay 2.5

März 4th, 2009

Today I uploaded a new video „Web Application Testing with Matrixay 2.5“ (1024×768). In this video I am using Matrixay to extract the structure of a database (tables, columns, …) via a SQL Injection vulnerability in one of my vulnerable test applications (Oracle 11.1.0.7 & PHP). After that I am downloading the content of the table.

Matrixay is a really good and easy to use commercial web scanner from DBAppSecurity Ltd.

Matrixay

Matrixay supports all kind of databases (Oracle, MSSQL, MySQL, DB2, …) and can even do simple database audit (e.g. check for weak Oracle passwords, …).

More videos can be found in our video section. I will add more in the next few weeks.

New version of bsqlbf (v 2.2) available

März 4th, 2009

Yesterday, Sumit Siddarth (Sid) from notsosecure.com released a new version of the sql injection tool bsqlbf. This updated version bsqlbf 2.2 supports now SQL Injection in „order by“ and „group by“.

bsqlbf supports Oracle, MSSQL, MySQL and Postgres.

Metasploit contains new Oracle exploits

März 2nd, 2009

Chris Gates wrote on his blog that Metasploit contains now exploits for Oracle bugs which were fixed in October 2008 (lt.compress) and January 2009 CPU.

Metasploit is becoming more and more useful for Oracle pentester…

New SQL Injection Whitepaper (for SQL Server)

Februar 8th, 2009

 Daniel Kachakil released an interesting whitepaper about fast data extraction using SQL Injection and XML statements on SQL server and a tool implementing this technique called SFX-SQLI.

The paper describes how to retrieve data from a SQL Server database using SQL Injection and XML. This technique is not new (for me). I am using such techniques in the Oracle environment via xmltransform or stragg since a while. It is possible to retrieve the entire content of a table in a single error message…

More details will be available on the SQL Injection book I am currently writing with some other security researchers…

The tool SFX-SQLI implements the concept for SQL Server.

Here is one of the examples how to export an entire table, e.g. via utl_inaddr. The output is limited to 4000 byte:

or 1= utl_inaddr.get_host_name((select xmltransform(sys_xmlagg(sys_xmlgen(username)),xmltype(‚< ?xml version=“1.0″?> ;
‚)).getstringval() listagg from all_users))–

Warning: ociexecute(): OCIStmtExecute: ORA-29257: host CUSTCOM_PROD;WEBTOOL;WEBDB;NELLDB;ERDB;B2B;BI;PM;SH;IX;OE;HR;SCOTT;MGMT_VIEW;MDDATA;SYSMAN;MDSYS;SI_INFORMTN_SCHEMA;ORDPLUGINS;ORDSYS;OLAPSYS;ANONYMOUS;XDB;CTXSYS;EXFSYS;WMSYS;DBSNMP;TSMSYS;DIP;OUTLN;SYSTEM;SYS; unknown ORA-06512: at „SYS.UTL_INADDR“, line 4 ORA-06512: at „SYS.UTL_INADDR“, line 35

Attacking Oracle with Metasploit Video published

Februar 7th, 2009

Chris Gates has published a video where he shows how to attack Oracle with Metasploit from the Shmoocon 09 conference.

Even if the attacks were shown on an outdated version of Oracle (10.1.0.3) it’s good to see that the Oracle support in Metasploit is getting better…

Chris has an interesting blog called carnal0wnage.blogspot.com.