 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 223
Members: 0
Total: 223
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
ITSecTeam's Havij v1.12 SQL Injection Tool |
 |
Posted: Wed Sep 29, 2010 4:05 pm |
|
|
Twipple |
Regular user |

 |
|
Joined: Sep 28, 2010 |
Posts: 10 |
|
|
|
 |
 |
 |
|
An absolutely fantastic tool for SQL Injection Artists who "can't be bothered" to inject manually. Personally I despise the use of SQL Tools. It's just lazy..
But yeah, i'm sure this will come in handy for some of you.
Here's a direct link to ITSecTeam's website where you can find more general information, screenshots and a download of this application.
Havij v1.12 Project Page
Code: | http://itsecteam.com/en/projects/project1.htm |
-HTTPS Support
-MsSQL Blind added
-MsAccess Blind added (Commerical version only)
-PostgreSQL added (Commerical version only)
-Check for update added.
-Manual queries with result added. (Commerical version only)
-1 row per 1 request (all in one request) added (Commerical version only)
-Dumping data into file added (Commerical version only)
-Saving data in XML format added (Commerical version only)
-Injecting targets with any port added (default http port is 80) (Commerical version only)
-XSS bug in saved reports fixed.
-Clear log added.
-Apply button added to the settings so it is possible to change the settings anytime (Commerical version only)
-keyword test and correction method added.
-finding columns count and string column optimized for better injection and data base detecting.
-Finding columns count and string column made better.
-"414 Request-URI too long" bug fixed.
-New method for getting tables and columns in mssql added.
-Some bugs in MsAccess injection when syntax has been defined manually fixed.
-Enable XP_Exec added to cmdshell (Commerical version only)
-Enable OS_Ex added to cmdshell (Commerical version only)
-Enable remote desktop added to cmdshell (Commerical version only)
-Confusing MsSQL 2005 with MySQL when finding columns count fixed.
-Broken MD5 cracker sites removed.
-a bug in detecting mssql no error fixed.
-a bug in getting columns in mssql no error fixed.
-a bug in injecting into access database fixed.
-a bug in getting data in mssql fixed.
-a bug in finding mssql's row count fixed.
-a bug in detecting database type when column count is found fixed.
-a bug in MsSQL no error manual syntax and command executation fixed.
Enjoy!
- Twipple [/code] |
|
|
|
|
 |
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|