

These two IP address options allow the script to perform ARP poisoning. IP address of the SQL client sending the queries These are four of the most popular database engines in use at this time. The tool currently has support for MSSQL, MySQL, Oracle, and PostgreSQL. The second option specifies the SQL server type. Since the previous blog covered the vulnerability and how to remediate it, this blog entry will focus on how to use this tool to test for SQL MITM vulnerabilities. Please fill out this form to get a link to download the file: (Here is the license agreement about this download.) You can download the Python script using the form below. The goal was to make an All-in-One SQL MITM tool. Lastly, it only supported Microsoft SQL Server which, while a popular database engine, only represents a fraction of the database types in use.ĭuring a recent pentest for an Anitian client, I decided to rewrite the whole tool to automate some testing I was performing. Second, the script relied on Ettercap to perform the MITM attack. It is rare you would have such information. First, you had to know an exact SQL query the database was handling. While the script worked, it had limitations.

I wrote a shell script to automate the entire process, which this blog published for all to use This allows you to execute a diverse set of attacks, such as creating a admin database user to gain access to data or functions. Using Ettercap filters I showed how you can replace a SQL query with your own malicious query in transit. I used Ettercap to perform a man-in-the-middle attack between a Microsoft SQL server and client. Early this year, I blogged about hacking SQL servers without a password. MORE HACKING SQL SERVERS WITHOUT A PASSWORD
