Exploiter is a tool that demonstrates how SQL Injection vulnerabilities in a Web Application can be exploited to retrieve database information such as usernames, passwords, credit card numbers etc.
# Exploiter is capable of using a single SQL Injection (SQLi) vulnerability to extract an entire database.
# Exploiter does not find SQL Injection vulnerabilities. You need to use a tool such as Watchfire AppScan for that.
# Supported databases:
Цитата:
1. SQL Server
2. MS Access
3. Oracle
Supports 3 methods of exploit:
Цитата:
1. Using SQL Convert
2. Using SQL Union
3. Blind SQL Injection
# Supports SSL and multi threading.
# Can run as standalone, or as an eXtension of AppScan. As an eXtension, it will automatically load all SQLi requests from AppScan.
# Performs brute force search if it fails to extract table or column names; this is mainly used for MS Access.