Working with SQLbit  Tool on Kali Linux OS

Example/Usage: Basic Usage

python3 sqlbit.py

We need to add the URL of the target in the config file as this tool does not accept command line arguments.

After entering the URL we need to run the sqlbit.py file.

You can see that we have got the names of tables that are been present in the URL’s database.

There are multiple tables present in the target domain’s database.


SQLbit – Automatize Boolean-Based Blind SQL Injections

SQL Injection or SQLi is the web application security flaw where the hacker or intruder can mislead with the SQL queries that a web application makes to its storage database. This can lead to viewing data, inserting data, manipulating data without having authorized access. The data which is manipulated has totally belonged to other users, or any other data that the web application itself is able to access. Nowadays, all online shopping applications, bank transactions use back-end database servers. So in case, the attacker can exploit SQL injection, the entire server is compromised.

Similar Reads

What is Blind SQL Injection?

A blind SQL Injection attack comes into the picture when the targeted web application is vulnerable to SQL Injection, but the twist is that the HTTP responses don’t contain any database results or errors which are supposed to be retrieved as per the query. Blind SQL Injection can be used to get sensitive data from the database servers. Most probably, the hacker asks true or false (1 or 0) queries to the application database and studies those responses based upon the answers of applications....

Installation of SQLbit Tool on Kali Linux OS

Step 1: Clone the tool in your Kali Linux operating system from GitHub platform....

Working with SQLbit  Tool on Kali Linux OS

Example/Usage: Basic Usage...