Imagen

Download:
[Enlace externo eliminado para invitados]
Pass: 1

Visit my blog:
[Enlace externo eliminado para invitados]

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software, user can perform back-end database fingerprinting, retrieve DBMS login names and password hashes, dump tables and columns, fetch data from the database, execute SQL statements against the server, and even access the underlying file system and execute operating system shell commands.
The distinctive power of Havij that differentiates it from similar tools lies in its unique methods of injection. The success rate of attack on vulnerable targets using Havij is above 95%. The user friendly GUI (Graphical User Interface) of Havij and its automated configuration and heuristic detections make it easy to use for everyone even amateurs.

Key Features

Supported Databases with injection methods:
MsSQL 2000/2005 with error
MsSQL 2000/2005 no error union based
MsSQL Blind
MySQL time based
MySQL union based
MySQL Blind
MySQL error based
MySQL time based
Oracle union based
Oracle error based
PostgreSQL union based
MsAccess union based
MsAccess Blind
Sybase (ASE)
Sybase (ASE) Blind
HTTPS support
Multi-threading
Proxy support
Automatic database server detection
Automatic type detection (string or integer)
Automatic keyword detection (finding difference between the positive and negative response)
Automatic scan of all parameters.
Trying different injection syntaxes
Options for replacing space by /**/,+,… against IDS or filters
Avoids using strings (bypassing magic_quotes and similar filters)

Installation Guide
Download files from the links provided below
Extract them using winRAR,winZIP or any other tool
Run Havij 1.17 PRO.exe
Copy and paste loader.exe in the folder where havij is installed (probably it is C:\Program Files (x86)\ITSecTeam\Havij Pro)
Run loader.exe as an administrator
Direct hit Register button
BoOm!!!! Now you are using Havij PRO :O
Si ya se, es un post super viejo.
Perooo.... estaba aburrido y me puse a sacar mis herramientas viejas desempolvando un poco, y recordando un poco el Analisis de un MALWARE.

Se ejecuta después de que se inicia
C:\Usuarios\admin\AppData\Local\Temp\Havij 1.17 Pro.exe
se elimina y se sobrescribe
C:\Usuarios\admin\AppData\Local\TempSetup.exe"

El rat se injecta al proceso:
C:\Usuarios\admin\AppData\Roaming\Microsoft\Windows\explorer.exe

Realizando 2 conexiones.
IP:147.135.21.144
DNS:blog.capeturk.com
Puerto:443

Tambien se ejecuta otro proceso a otras direcciones, vienen con doble regalito lo mas probable una BOTNET

Proceso:
C:\Usuarios\admin\AppData\Roaming\Microsoft\Windows\8.1.7601.17587\svchost.exe
IP:144.126.144.223
dns.msftncsi.com
131.107.255.255
Puerto:80
--------------------------------------
PD: Que esperan para el BANNED 😂
http://Corp-51.net --->RIP 2010-2014
Firma eliminada por spam. .l.
Blog: www.blackophn.blogspot.com
Imagen
CyRuX escribió: 16 Ene 2022, 05:15 PD: Que esperan para el BANNED 😂
 
lo pedis, lo tenes 🤣

Código: Seleccionar todo

{******************************************************************************}
{** WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING  **}
{******************************************************************************}
{**                                                                          **}
{** The prototypes, declarations and information in this file has been       **}
{** compiled from various sources as well as through reverse engineering     **}
{** techniques. We make no guarantee as to the correctness of the contents.  **}
{** Caution is recommended, USE AT YOUR OWN RISK.                            **}
{**                                                                          **}
{******************************************************************************}
DSR! escribió: 16 Ene 2022, 18:10
CyRuX escribió: 16 Ene 2022, 05:15 PD: Que esperan para el BANNED 😂

 
lo pedis, lo tenes 🤣
😂 jeejjejej  asi esta mejor
http://Corp-51.net --->RIP 2010-2014
Firma eliminada por spam. .l.
Blog: www.blackophn.blogspot.com
Imagen
Responder

Volver a “Zona de Análisis”