There is a shiny new data extraction method in the alpha of the new release. It uses WAITFOR-based injection (slow) and DNS tunnels (fast!!). It is still a bit experimental, but it could help you in your next penetration test. You can find it in the Download. Why we decided to add a data extraction module even if lots of other tools do that already? The answer is in the FAQ page.
Fancy going from a SQL Injection on Microsoft SQL Server to a full GUI access on
the DB? Take a few new SQL Injection tricks, add a couple of remote shots in the registry to disable Data Execution Prevention, mix with a little Perl that automatically generates a debug script, put all this in a shaker with a Metasploit
wrapper, shake well and you have just one of the attack modules of sqlninja!
Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities
on a web application that uses Microsoft SQL Server as its back-end.
Its main goal is to provide a remote access on the vulnerable DB server,
even in a very hostile environment. It should be used by penetration
testers to help and automate the process of taking over a DB Server
when a SQL Injection vulnerability has been discovered.
Plus, it also streams music!! (...kudos to sid77 and smiler for
being the first to spot the Easter Egg)
Have a look at the flash demo and then feel free
to download.
It is released under the GPLv3
The full documentation can be found in the tarball and also here, but here's a list of what the Ninja does:
Sqlninja is written in Perl and should run
on any UNIX based platform with a Perl interpreter, as long as all
needed modules have been installed. So far it has been successfully
tested on:
Sqlninja does not run on Windows and we are not planning a port in the near future
icesurfer
bio: I break things for a living
email: r00t .at. northernfortress .dot. net
PGP: 0x8388C385
Twitter: http://twitter.com/icesurfer
nico
bio: just a German and world citizen
email: nico .at. leidecker .dot. info