Wednesday, 11 April 2012

| TUT How To Find Vulnerable Websites | TUT |

I thought i'd post this because using a tool like this is much quicker when wanting to do a quick SQLI. This tool is a little like havij but in my opinion better.

First off you need to download the actual tool itself (No this is not my own tool)
Download ;
Download here

Once you've downloaded the file above you need to extract it to a place you will know where to find it. A picture of the programme itself is below.

[Image: dnjFaQ.png]

NOTE- Make sure you don't extract the tool away from the folder because that's where the dorks are.

Ok so now for the tutorial, this is a little long but who ever said hacking was easy?, just simply follow these steps bellow and then you will be successful in "hacking" your opponent.

Step 1 -First you will need to click the "Scanner" tab and then the little "+" icon on the "All dorks". Once done you will see a list like this ;
[Image: Qwsb0M.png]
this is called a "dork" you can pick anyone you want by clicking the little "+" icon again.

Step 2 - Next you will need to pick a specific "dork" i'm going to be using ASP with dork ; ".asp?bookID=" you can use really doesn't matter. So now our stage process should be as shown below.
[Image: hkZGIS.png]

Step 3 - Now you will need to press the scan button, I can't really explain this part so I got a picture for you, make sure to press "Remove duplicates".
[Image: RQBeM5.png]

Step 4 - Once completed "Step 3" the next thing you will need to do is right click your list (the white part) and press "Send to SQLI Crawler" as so.
[Image: aYNRVU.png]

Step 5 - Once in the SQLI Crawler you will need to press "Crawl" this will find you the vulnerable links from the ones you just just imported, this didn't work for me as good as I was hoping because I used a dork basically that doesn't find many vulnerable sites, this tutorial is just an example of what it'l be like. [Image: CvFT8o.png]

Step 6) Following on from "Step 5" the list takes a while because the tool itself is finding if its vulnerable or not. It should look a little like this [Image: JJIF4i.png]

Step 7 - Once your list is populated you have now got yourself some vulnerable sites to SQL inject/upload shell.

I would of continued the tutorial into more depth of executing SQL injection with this tool but there's already tutorials around that you can use. If you need any help with SQL injecting/uploading a shell just PM me, I'll be more than happy to help. I know you might think this tutorial is well pointless but it's a simple way of finding vulnerable websites whilst using some of the best dorks. Oh and before you guys say isn't it better just using "Google" well in my opinion no, this method tells you if its vulnerable and gives you over +50 sites at a time which will keep you busy.

I hope you liked this tutorial and remember whenever hacking/exploiting sites always use a proxy, here's a few proxy's that I use.


Post a Comment