[TOOL] SQID - SQL Injection Digger



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



SQID - SQL Injection Digger
------------------------------------------------------------------------


SUMMARY



DETAILS

SQL injection digger is a command line program that looks for SQL
injections and common errors in websites. This version now can perform the
following operations.
* Look for SQL injections and common errors in website urls found by
performing a google search
* Look for SQL injections and common erros in a given url or a file with
urls
* Look for SQL injections and common errors in links from a web page
* Crawl a website/webpage and do the above

Also supports:
* Load multiple triggers from file
* Load multiple signature databases from files
* HTTPS support
* HTTP proxy support with authentication
* Basic authentication
* Specify user agent
* Specify referer
* HTTP Cookies loading from command line or a file

SQID's greatest strength lies in its simple architecture of inserting
triggers in URL parameters and matching responses using regular
expressions. Hence one can use it for other purposes also.


ADDITIONAL INFORMATION

The information has been provided by <mailto:contact@xxxxxxxxxxx> Metaeye
SG.
To keep updated with the tool visit the project's homepage at:
<http://sqid.rubyforge.org> http://sqid.rubyforge.org



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NEWS] Cisco Unified CallManager Multiple SQL Injections in User And Admin Interface
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Cisco Unified CallManager Multiple SQL Injections in User And Admin ... Attackers need access to either the user or administration interface. ...
    (Securiteam)
  • [UNIX] Multiple Vulnerabilities In phProfession Module For PostNuke
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... This project supports only the PostNuke module starting from version 3.0." ... cross-site scripting and SQL injections. ...
    (Securiteam)
  • [NT] Cross Application Scripting in Trend Micros Antivirus Software
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The SecuriTeam alerts list - Free, Accurate, Independent. ... When the product alerts the user of a possible virus, it creates an HTML ...
    (Securiteam)
  • [NT] Microsoft Windows NTFS Improper Handler Closing
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... from a system shutdown, uninitialized data may be visible in files from ...
    (Securiteam)
  • [EXPL] Eudora Attachment Spoof Exploit Revisited
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... present in the newest release of Eudora. ... Can be exploited if there is more than one way into attach: in my setup ...
    (Securiteam)