This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SpoC 007 - SqlMap"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
'''AoC Candidate''': Bernardo Damele
+
'''SpoC Candidate''': [[User:inquis|Bernardo Damele]]
  
 
'''Project coordinator''': Dinis Cruz
 
'''Project coordinator''': Dinis Cruz
  
'''Project Progress''': 0% Complete  
+
'''Project Progress''': 60% Complete  
  
==== Project Progress ====
+
=== Project Overview ===
 +
 
 +
[http://sqlmap.sourceforge.net sqlmap] is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of this project is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.
 +
 
 +
 
 +
=== Objectives for OWASP Spring of Code 2007 ===
 +
 
 +
* Add support for Oracle database management system
 +
* Add support to extract database users password hash
 +
* Extend inband SQL injection functionality to all other possible queries
 +
* Add Microsoft SQL Server database fingerprint
 +
* Add a fuzzer class with the aim to parse html page looking for standard database error messages consequently improving database fingerprinting
 +
* Add support for SQL injection on HTTP ''Cookie'' and ''User-Agent'' headers
 +
* Add support for query ETA (Estimated Time of Arrival) real time calculation
 +
* Improve Google dorking support to take advantage of remote hosts affected by SQL injection to perform other command line argument actions
 +
* Improve logging functionality
 +
 
 +
 
 +
=== Project Progress ===
 +
 
 +
==== Accomplished objectives at 12nd of July 2007 ====
 +
 
 +
* Added support to extract database users password hash on MySQL and PostgreSQL - 100%
 +
* Extended inband SQL injection functionality to all other possible queries - 100%
 +
* Added Microsoft SQL Server database fingerprint - 100%
 +
* Added support for query ETA (Estimated Time of Arrival) real time calculation - 100%
 +
* Improved Google dorking support to take advantage of remote hosts affected by SQL injection to perform other command line argument actions -100%
 +
* Improved logging functionality - 100%
 +
 
 +
==== TODO objectives at 12nd of July 2007 ====
 +
 
 +
* Add support for Oracle database management system - 10%
 +
* Add support to extract database users password hash on Microsoft SQL Server - 10%
 +
* Add a fuzzer class with the aim to parse html page looking for standard database error messages consequently improving database fingerprinting - 40%
 +
* Add support for SQL injection on HTTP ''Cookie'' and ''User-Agent'' headers - 0%
 +
 
 +
 
 +
=== Links ===
 +
 
 +
* [http://sqlmap.sourceforge.net sqlmap homepage]
 +
* [http://sqlmap.svn.sourceforge.net/viewvc/sqlmap/ sqlmap SVN repository web interface]
 +
* [https://sourceforge.net/project/showfiles.php?group_id=171598&package_id=196107 sqlmap SourceForge File List page]
 +
* [http://sqlmap.sourceforge.net/dev/index.html sqlmap development documentation]

Revision as of 10:47, 12 July 2007

SpoC Candidate: Bernardo Damele

Project coordinator: Dinis Cruz

Project Progress: 60% Complete

Project Overview

sqlmap is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of this project is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.


Objectives for OWASP Spring of Code 2007

  • Add support for Oracle database management system
  • Add support to extract database users password hash
  • Extend inband SQL injection functionality to all other possible queries
  • Add Microsoft SQL Server database fingerprint
  • Add a fuzzer class with the aim to parse html page looking for standard database error messages consequently improving database fingerprinting
  • Add support for SQL injection on HTTP Cookie and User-Agent headers
  • Add support for query ETA (Estimated Time of Arrival) real time calculation
  • Improve Google dorking support to take advantage of remote hosts affected by SQL injection to perform other command line argument actions
  • Improve logging functionality


Project Progress

Accomplished objectives at 12nd of July 2007

  • Added support to extract database users password hash on MySQL and PostgreSQL - 100%
  • Extended inband SQL injection functionality to all other possible queries - 100%
  • Added Microsoft SQL Server database fingerprint - 100%
  • Added support for query ETA (Estimated Time of Arrival) real time calculation - 100%
  • Improved Google dorking support to take advantage of remote hosts affected by SQL injection to perform other command line argument actions -100%
  • Improved logging functionality - 100%

TODO objectives at 12nd of July 2007

  • Add support for Oracle database management system - 10%
  • Add support to extract database users password hash on Microsoft SQL Server - 10%
  • Add a fuzzer class with the aim to parse html page looking for standard database error messages consequently improving database fingerprinting - 40%
  • Add support for SQL injection on HTTP Cookie and User-Agent headers - 0%


Links