Jump to content
Nytro

NTO SQL Invader

Recommended Posts

Posted

NTO SQL Invader

NTO SQL Invader gives the ability to quickly and easily exploit or demonstrate SQL Injection vulnerabilities in Web applications. With a few simple clicks, you will be able to exploit a vulnerability to view the list of records, tables and user accounts of the back-end database.

ntosqlinvader_screenshot_400.png

Easy to use - The tool’s GUI interface enables you to simply paste the injectable request found by a DAST tool or feed a detailed request straignt from an application scan report. You can then control how much information is harvested.

Clearly presents evidence - Unlike tools that provide all data via command line, NTO SQL Invader provides the data in a organized manner that is useful for both executive meetings as well as technical analysis and remediation.

Enables easy transport of logging data - All of the data harvested from NTO SQL Invader can be saved into a CSV file so the reports can be included as penetration evidence as part of a presentation or POC.

Video demo:

http://www.ntobjectives.com/research/sqlinvader-intro

Download:

http://go.ntobjectives.com/e/8672/-18735-NTOSQLInvader-Setup-exe/EEOX/47243855

Mirror:

http://www.multiupload.com/33KTSNSWI0

Sursa: http://go.ntobjectives.com/l/8672/2011-12-01/DRMN

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...