Support to search for specific database names, specific tables across all databases or specific columns across all databases’ tables.The user can also choose to dump only a range of characters from each column’s entry. Support to dump database tables entirely, a range of entries or specific columns as per user’s choice.Automatic recognition of password hash formats and support for cracking them using a dictionary-based attack.Support to enumerate users, password hashes, privileges, roles, databases, tables and columns.Support to directly connect to the database without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name.Full support for six SQL injection techniques: boolean-based blind, time-based blind, error-based, UNION query-based, stacked queries and out-of-band.Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB, HSQLDB and Informix database management systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |