Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 8c0ac76

Browse files
committed
Updated to sqlmap 0.7 release candidate 1
1 parent b997df7 commit 8c0ac76

129 files changed

Lines changed: 8370 additions & 1372 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

doc/AUTHORS

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,3 @@
1-
Bernardo Damele A. G. (inquis) - project leader, core developer
1+
Bernardo Damele A. G. (inquis) - Lead developer
22
3-
PGP Key ID: 0x05F5A30F
4-
5-
Daniele Bellucci (belch) - project founder, initial developer
6-
7-
PGP Key ID: 0x9A0E8190
3+
PGP Key ID: 0x05F5A30F

doc/ChangeLog

Lines changed: 27 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,34 @@
1-
sqlmap (0.6.5-1) stable; urgency=low
1+
sqlmap (0.7rc1-1) stable; urgency=low
22

3+
* Added support to execute arbitrary commands on the database server
4+
underlying operating system either returning the standard output or not
5+
via UDF injection on MySQL and PostgreSQL and via xp_cmdshell() stored
6+
procedure on Microsoft SQL Server;
7+
* Added support for out-of-band connection between the attacker box and
8+
the database server underlying operating system via stand-alone payload
9+
stager created by Metasploit and supporting Meterpreter, shell and VNC
10+
payloads for both Windows and Linux;
11+
* Added support for out-of-band connection via Microsoft SQL Server 2000
12+
and 2005 'sp_replwritetovarbin' stored procedure heap-based buffer
13+
overflow (MS09-004) exploitation with multi-stage Metasploit payload
14+
support;
15+
* Added support for out-of-band connection via SMB reflection attack with
16+
UNC path request from the database server to the attacker box by using
17+
the Metasploit smb_relay exploit;
18+
* Added support to read and write (upload) both text and binary files on
19+
the database server underlying file system for MySQL, PostgreSQL and
20+
Microsoft SQL Server;
21+
* Added database process' user privilege escalation via Windows Access
22+
Tokens kidnapping on MySQL and Microsoft SQL Server via either
23+
Meterpreter's incognito extension or Churrasco stand-alone executable;
24+
* Speed up the inference algorithm by providing the minimum required
25+
charset for the query output;
326
* Major bug fix in the comparison algorithm to correctly handle also the
427
case that the url is stable and the False response changes the page
5-
content very little.
28+
content very little;
29+
* Many minor bug fixes, minor enhancements and layout adjustments.
630

7-
-- Bernardo Damele A. G. <[email protected]> Day, DD MMM 2009 HH:MM:SS +0000
31+
-- Bernardo Damele A. G. <[email protected]> Wed, 22 Apr 2009 10:30:00 +0000
832

933
sqlmap (0.6.4-1) stable; urgency=low
1034

doc/README.html

Lines changed: 276 additions & 180 deletions
Large diffs are not rendered by default.

doc/README.pdf

17.5 KB
Binary file not shown.

doc/README.sgml

Lines changed: 272 additions & 167 deletions
Large diffs are not rendered by default.

doc/THANKS

Lines changed: 64 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,20 @@ Chip Andrews <[email protected]>
55
at SQLSecurity.com and permission to implement the update feature
66
taking data from his site
77

8+
Daniele Bellucci <[email protected]>
9+
for starting sqlmap project and developing it between July and August
10+
2006
11+
812
Jack Butler <[email protected]>
913
for providing me with the sqlmap site favicon
1014

15+
Cesar Cerrudo <[email protected]>
16+
for his Windows access token kidnapping tool Churrasco included in
17+
sqlmap tree as a contrib library and used to run the stand-alone
18+
payload stager on the target Windows machine as SYSTEM user if the
19+
user wants to perform a privilege escalation attack,
20+
http://www.argeniss.com/research/Churrasco.zip
21+
1122
Karl Chen <[email protected]>
1223
for providing with the multithreading patch for the inference
1324
algorithm
@@ -19,6 +30,11 @@ Pierre Chifflier <[email protected]>
1930
Stefano Di Paola <[email protected]>
2031
for suggesting good features
2132

33+
Dan Guido <[email protected]>
34+
for promoting sqlmap in the context of the Penetration Testing and
35+
Vulnerability Analysis class at the Polytechnic University of New York,
36+
http://isisblogs.poly.edu/courses/pentest/
37+
2238
Adam Faheem <[email protected]>
2339
for reporting a few bugs
2440

@@ -33,6 +49,9 @@ Giorgio Fedon <[email protected]>
3349
for suggesting a speed improvement for bisection algorithm
3450
for reporting a bug when running against Microsoft SQL Server 2005
3551

52+
Alan Franzoni <[email protected]>
53+
for helping me out with Python subprocess library
54+
3655
Ivan Giacomelli <[email protected]>
3756
for reporting a bug
3857
for suggesting a minor enhancement
@@ -59,11 +78,20 @@ Anant Kochhar <[email protected]>
5978
for providing me with feedback on the user's manual
6079

6180
Alexander Kornbrust <[email protected]>
62-
for reporting a bug
81+
for reporting a couple of bugs
82+
83+
Guido Landi <[email protected]>
84+
for the great technical discussions
85+
for Microsoft SQL Server 2000 and Microsoft SQL Server 2005
86+
'sp_replwritetovarbin' stored procedure heap-based buffer overflow
87+
(MS09-004) exploit development, http://www.milw0rm.com/author/1413
6388

6489
Nico Leidecker <[email protected]>
6590
for providing me with feedback on a few features
6691

92+
Gabriel Lima <[email protected]>
93+
for reporting a bug
94+
6795
Pavol Luptak <[email protected]>
6896
for reporting a bug when injecting on a POST data parameter
6997

@@ -73,7 +101,7 @@ Michael Majchrowicz <[email protected]>
73101
for suggesting a lot of ideas and features
74102

75103
Ferruh Mavituna <[email protected]>
76-
for providing me with ideas on the implementation on a couple of
104+
for providing me with ideas on the implementation of a couple of
77105
new features
78106

79107
Enrico Milanese <[email protected]>
@@ -83,6 +111,14 @@ Enrico Milanese <[email protected]>
83111
Roberto Nemirovsky <[email protected]>
84112
for pointing me out some enhancements
85113

114+
Markus Oberhumer <[email protected]>
115+
Laszlo Molnar <[email protected]>
116+
John F. Reiser <[email protected]>
117+
for their great tool UPX (Ultimate Packer for eXecutables) included
118+
in sqlmap tree as a contrib library and used mainly to pack the
119+
Metasploit Framework 3 payload stager portable executable,
120+
http://upx.sourceforge.net
121+
86122
Antonio Parata <[email protected]>
87123
for providing me with some ideas for the PHP backdoor
88124

@@ -123,7 +159,7 @@ Uemit Seren <[email protected]>
123159
for reporting a minor adjustment when running with python 2.6
124160

125161
Sumit Siddharth <[email protected]>
126-
for providing me with ideas on the implementation on a couple of
162+
for providing me with ideas on the implementation of a couple of
127163
features
128164

129165
@@ -133,6 +169,9 @@ Konrads Smelkovs <[email protected]>
133169
for reporting a few bugs in --sql-shell and --sql-query on Microsoft
134170
SQL Server
135171

172+
Marek Stiefenhofer <[email protected]>
173+
for reporting a bug
174+
136175
Jason Swan <[email protected]>
137176
for reporting a bug when enumerating columns on Microsoft SQL Server
138177
for suggesting a couple of improvements
@@ -142,10 +181,13 @@ Alessandro Tanasi <[email protected]>
142181
for suggesting many features and reporting some bugs
143182
for reviewing the documentation
144183

184+
Andres Tarasco <[email protected]>
185+
for providing me with good feedback
186+
145187
Efrain Torres <[email protected]>
146188
for helping me out to improve the Metasploit Framework 3 sqlmap
147189
auxiliary module and for commiting it on the Metasploit official
148-
Subversion repository
190+
subversion repository
149191
for his great Metasploit WMAP Framework
150192

151193
Sandro Tosi <[email protected]>
@@ -160,6 +202,11 @@ Bedirhan Urgun <[email protected]>
160202
Kyprianos Vassilopoulos <[email protected]>
161203
for reporting an unhandled connection exception
162204

205+
Anthony Zboralski <[email protected]>
206+
for providing me with detailed feedback
207+
for reporting a few minor bugs
208+
for donating to sqlmap development
209+
163210
164211
for reporting a bug when running on Windows
165212

@@ -172,6 +219,19 @@ Sylphid <[email protected]>
172219

173220
== Organizations ==
174221

222+
Black Hat team <[email protected]>
223+
for the opportunity to present my research on 'Advanced SQL injection
224+
to operating system full control' at Black Hat Europe 2009 Briefings on
225+
April 16, 2009 in Amsterdam (NL). I unveiled and demonstrated some of
226+
the sqlmap 0.7 release candidate version new features during my
227+
presentation
228+
229+
Metasploit LLC <[email protected]>
230+
for their powerful tool Metasploit Framework 3, used by sqlmap, among
231+
others things, to create the payload stager and establish an
232+
out-of-band connection between sqlmap and the database server,
233+
http://www.metasploit.com/framework
234+
175235
OWASP Board <http://www.owasp.org>
176236
for sponsoring part of the sqlmap development in the context of OWASP
177237
Spring of Code 2007

0 commit comments

Comments
 (0)