ID KITPLOIT:3849163972173320169
Type kitploit
Reporter KitPloit
Modified 2013-05-23T20:55:19
Description
jSQL Injection is a lightweight application used to find database information from a distant server.
jSQL is free, open source and cross-platform (Windows, Linux, Mac OS X, Solaris).
Version 0.4 features:
- GET, POST, header, cookie methods
- Normal, error based, blind, time based algorithms
- Automatic best algorithm selection
- Multi-thread control (start/pause/resume/stop)
- Progression bars
- Shows URL calls
- Simple evasion
- Proxy setting
- Distant file reading
- Webshell deposit
- Terminal for webshell commands
- Configuration backup
- Update checker
- Admin page checker
- Brute forcer (md5 mysql...)
- Coder (encode decode base64 hex md5...)
- Supports MySQL
Download jSQL Injection v0.4
{"id": "KITPLOIT:3849163972173320169", "bulletinFamily": "tools", "title": "[jSQL Injection v0.4] Java tool for automatic database injection", "description": "[  ](<https://2.bp.blogspot.com/-KuvD4qAAeFQ/UZ6BsNUXAsI/AAAAAAAAApw/FNyerlEhYdI/s1600/jSQL.png>)\n\n \n\n\njSQL Injection is a lightweight application used to find database information from a distant server. \n\n \n\n\njSQL is free, open source and cross-platform (Windows, Linux, Mac OS X, Solaris). \n\n \nVersion 0.4 features: \n\n\n * GET, POST, header, cookie methods \n * Normal, error based, blind, time based algorithms \n * Automatic best algorithm selection \n * Multi-thread control (start/pause/resume/stop) \n * Progression bars \n * Shows URL calls \n * Simple evasion \n * Proxy setting \n * Distant file reading \n * Webshell deposit \n * Terminal for webshell commands \n * Configuration backup \n * Update checker \n * Admin page checker \n * Brute forcer (md5 mysql...) \n * Coder (encode decode base64 hex md5...) \n * Supports MySQL \n\n \n\n\n[ ** Download jSQL Injection v0.4 ** ](<https://code.google.com/p/jsql-injection/downloads/list>)\n", "published": "2013-05-23T20:55:19", "modified": "2013-05-23T20:55:19", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://www.kitploit.com/2013/05/jsql-injection-v04-java-tool-for.html", "reporter": "KitPloit", "references": [], "cvelist": [], "type": "kitploit", "lastseen": "2019-06-26T15:21:35", "history": [{"bulletin": {"bulletinFamily": "tools", "cvelist": ["CVE-2019-0708"], "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "description": "[  ](<https://2.bp.blogspot.com/-KuvD4qAAeFQ/UZ6BsNUXAsI/AAAAAAAAApw/FNyerlEhYdI/s1600/jSQL.png>)\n\n \n\n\njSQL Injection is a lightweight application used to find database information from a distant server. \n\n \n\n\njSQL is free, open source and cross-platform (Windows, Linux, Mac OS X, Solaris). \n\n \nVersion 0.4 features: \n\n\n * GET, POST, header, cookie methods \n * Normal, error based, blind, time based algorithms \n * Automatic best algorithm selection \n * Multi-thread control (start/pause/resume/stop) \n * Progression bars \n * Shows URL calls \n * Simple evasion \n * Proxy setting \n * Distant file reading \n * Webshell deposit \n * Terminal for webshell commands \n * Configuration backup \n * Update checker \n * Admin page checker \n * Brute forcer (md5 mysql...) \n * Coder (encode decode base64 hex md5...) \n * Supports MySQL \n\n \n\n\n[ ** Download jSQL Injection v0.4 ** ](<https://code.google.com/p/jsql-injection/downloads/list>)\n", "edition": 6, "enchantments": {"dependencies": {"modified": "2019-06-21T09:56:27", "references": [{"idList": ["MYHACK58:62201994152", "MYHACK58:62201994259", "MYHACK58:62201994154", "MYHACK58:62201994234", "MYHACK58:62201994153", "MYHACK58:62201994162"], "type": "myhack58"}, {"idList": ["MSRC:6A6ED6A5B652378DCBA3113B064E973B"], "type": "msrc"}, {"idList": ["MSF:AUXILIARY/SCANNER/RDP/CVE_2019_0708_BLUEKEEP"], "type": "metasploit"}, {"idList": ["KITPLOIT:1124515301427151465", "KITPLOIT:2602806251266968639", "KITPLOIT:7797209470641311174", "KITPLOIT:7792589785128735403", "KITPLOIT:8926448594401626613", "KITPLOIT:5694432819468513066", "KITPLOIT:5247448233912620664", "KITPLOIT:998955151150716619", "KITPLOIT:2743937953207729963", "KITPLOIT:2189492030632553496"], "type": "kitploit"}, {"idList": ["SMNTC-108273"], "type": "symantec"}, {"idList": ["CVE-2019-0708"], "type": "cve"}, {"idList": ["F5:K25238311"], "type": "f5"}]}, "score": {"modified": "2019-06-21T09:56:27", "value": 4.0, "vector": "NONE"}}, "hash": "84f7e458d06deca4591611a9b94050777ca08b4a9b9b582038eca220ebeb0937", "hashmap": [{"hash": "1c02263ec9e9872fe691f0953a820220", "key": "cvelist"}, {"hash": "d170ed44ff3717127aa81f1dd8ee0d41", "key": "toolHref"}, {"hash": "283e0b2de6608f53666c45abf85f2146", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "aba454e3574969396c0dddcb45011dcc", "key": "reporter"}, {"hash": "edfca85c4c320ffaa9dcfdcb6a20ce1d", "key": "cvss"}, {"hash": "4a931512ce65bdc9ca6808adf92d8783", "key": "bulletinFamily"}, {"hash": "ea91f6ca501ac2fc96ac024dc9a8b807", "key": "description"}, {"hash": "4553be2119d862322dd6fec6bb385401", "key": "type"}, {"hash": "b9b3baecbe8a3d078563d87aff174ca7", "key": "title"}, {"hash": "4c1b2df7e41879d046db63c9344705f0", "key": "modified"}, {"hash": "4c1b2df7e41879d046db63c9344705f0", "key": "published"}], "history": [], "href": "http://www.kitploit.com/2013/05/jsql-injection-v04-java-tool-for.html", "id": "KITPLOIT:3849163972173320169", "lastseen": "2019-06-21T09:56:27", "modified": "2013-05-23T20:55:19", "objectVersion": "1.3", "published": "2013-05-23T20:55:19", "references": [], "reporter": "KitPloit", "title": "[jSQL Injection v0.4] Java tool for automatic database injection", "toolHref": "https://code.google.com/p/jsql-injection/downloads/list", "type": "kitploit", "viewCount": 0}, "differentElements": ["cvss", "cvelist"], "edition": 6, "lastseen": "2019-06-21T09:56:27"}, {"bulletin": {"bulletinFamily": "tools", "cvelist": ["CVE-2018-9995"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "description": "[  ](<https://2.bp.blogspot.com/-KuvD4qAAeFQ/UZ6BsNUXAsI/AAAAAAAAApw/FNyerlEhYdI/s1600/jSQL.png>)\n\n \n\n\njSQL Injection is a lightweight application used to find database information from a distant server. \n\n \n\n\njSQL is free, open source and cross-platform (Windows, Linux, Mac OS X, Solaris). \n\n \nVersion 0.4 features: \n\n\n * GET, POST, header, cookie methods \n * Normal, error based, blind, time based algorithms \n * Automatic best algorithm selection \n * Multi-thread control (start/pause/resume/stop) \n * Progression bars \n * Shows URL calls \n * Simple evasion \n * Proxy setting \n * Distant file reading \n * Webshell deposit \n * Terminal for webshell commands \n * Configuration backup \n * Update checker \n * Admin page checker \n * Brute forcer (md5 mysql...) \n * Coder (encode decode base64 hex md5...) \n * Supports MySQL \n\n \n\n\n[ ** Download jSQL Injection v0.4 ** ](<https://code.google.com/p/jsql-injection/downloads/list>)\n", "edition": 2, "enchantments": {"score": {"modified": "2018-09-27T03:12:11", "value": 5.0, "vector": "NONE"}}, "hash": "2bc8328fac21573d19e70b3813b01586f9980fce7014e5dd4c674298eb7488e0", "hashmap": [{"hash": "d170ed44ff3717127aa81f1dd8ee0d41", "key": "toolHref"}, {"hash": "283e0b2de6608f53666c45abf85f2146", "key": "href"}, {"hash": "f53d5bf72267786b4f994f9383d524ec", "key": "cvelist"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "aba454e3574969396c0dddcb45011dcc", "key": "reporter"}, {"hash": "4a931512ce65bdc9ca6808adf92d8783", "key": "bulletinFamily"}, {"hash": "a792e2393dff1e200b885c5245988f6f", "key": "cvss"}, {"hash": "ea91f6ca501ac2fc96ac024dc9a8b807", "key": "description"}, {"hash": "4553be2119d862322dd6fec6bb385401", "key": "type"}, {"hash": "b9b3baecbe8a3d078563d87aff174ca7", "key": "title"}, {"hash": "4c1b2df7e41879d046db63c9344705f0", "key": "modified"}, {"hash": "4c1b2df7e41879d046db63c9344705f0", "key": "published"}], "history": [], "href": "http://www.kitploit.com/2013/05/jsql-injection-v04-java-tool-for.html", "id": "KITPLOIT:3849163972173320169", "lastseen": "2018-09-27T03:12:11", "modified": "2013-05-23T20:55:19", "objectVersion": "1.3", "published": "2013-05-23T20:55:19", "references": [], "reporter": "KitPloit", "title": "[jSQL Injection v0.4] Java tool for automatic database injection", "toolHref": "https://code.google.com/p/jsql-injection/downloads/list", "type": "kitploit", "viewCount": 0}, "differentElements": ["cvss", "cvelist"], "edition": 2, "lastseen": "2018-09-27T03:12:11"}, {"bulletin": {"bulletinFamily": "tools", "cvelist": ["CVE-2018-10933"], "cvss": {"score": 6.4, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:NONE/"}, "description": "[  ](<https://2.bp.blogspot.com/-KuvD4qAAeFQ/UZ6BsNUXAsI/AAAAAAAAApw/FNyerlEhYdI/s1600/jSQL.png>)\n\n \n\n\njSQL Injection is a lightweight application used to find database information from a distant server. \n\n \n\n\njSQL is free, open source and cross-platform (Windows, Linux, Mac OS X, Solaris). \n\n \nVersion 0.4 features: \n\n\n * GET, POST, header, cookie methods \n * Normal, error based, blind, time based algorithms \n * Automatic best algorithm selection \n * Multi-thread control (start/pause/resume/stop) \n * Progression bars \n * Shows URL calls \n * Simple evasion \n * Proxy setting \n * Distant file reading \n * Webshell deposit \n * Terminal for webshell commands \n * Configuration backup \n * Update checker \n * Admin page checker \n * Brute forcer (md5 mysql...) \n * Coder (encode decode base64 hex md5...) \n * Supports MySQL \n\n \n\n\n[ ** Download jSQL Injection v0.4 ** ](<https://code.google.com/p/jsql-injection/downloads/list>)\n", "edition": 4, "enchantments": {"score": {"modified": "2018-10-23T03:25:33", "value": 5.0, "vector": "NONE"}}, "hash": "51a7905fdcfc556a2f185532d188ffdda5ff40686a18b4069dd0f15f2a0c30c1", "hashmap": [{"hash": "d170ed44ff3717127aa81f1dd8ee0d41", "key": "toolHref"}, {"hash": "283e0b2de6608f53666c45abf85f2146", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "74ae407306a397b0a0ad358180716883", "key": "cvss"}, {"hash": "aba454e3574969396c0dddcb45011dcc", "key": "reporter"}, {"hash": "4a931512ce65bdc9ca6808adf92d8783", "key": "bulletinFamily"}, {"hash": "ea91f6ca501ac2fc96ac024dc9a8b807", "key": "description"}, {"hash": "4553be2119d862322dd6fec6bb385401", "key": "type"}, {"hash": "b9b3baecbe8a3d078563d87aff174ca7", "key": "title"}, {"hash": "17be3096147bd1bcf829a9879cbe6f7d", "key": "cvelist"}, {"hash": "4c1b2df7e41879d046db63c9344705f0", "key": "modified"}, {"hash": "4c1b2df7e41879d046db63c9344705f0", "key": "published"}], "history": [], "href": "http://www.kitploit.com/2013/05/jsql-injection-v04-java-tool-for.html", "id": "KITPLOIT:3849163972173320169", "lastseen": "2018-10-23T03:25:33", "modified": "2013-05-23T20:55:19", "objectVersion": "1.3", "published": "2013-05-23T20:55:19", "references": [], "reporter": "KitPloit", "title": "[jSQL Injection v0.4] Java tool for automatic database injection", "toolHref": "https://code.google.com/p/jsql-injection/downloads/list", "type": "kitploit", "viewCount": 0}, "differentElements": ["cvss", "cvelist"], "edition": 4, "lastseen": "2018-10-23T03:25:33"}, {"bulletin": {"bulletinFamily": "tools", "cvelist": ["CVE-2019-0708"], "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "description": "[  ](<https://2.bp.blogspot.com/-KuvD4qAAeFQ/UZ6BsNUXAsI/AAAAAAAAApw/FNyerlEhYdI/s1600/jSQL.png>)\n\n \n\n\njSQL Injection is a lightweight application used to find database information from a distant server. \n\n \n\n\njSQL is free, open source and cross-platform (Windows, Linux, Mac OS X, Solaris). \n\n \nVersion 0.4 features: \n\n\n * GET, POST, header, cookie methods \n * Normal, error based, blind, time based algorithms \n * Automatic best algorithm selection \n * Multi-thread control (start/pause/resume/stop) \n * Progression bars \n * Shows URL calls \n * Simple evasion \n * Proxy setting \n * Distant file reading \n * Webshell deposit \n * Terminal for webshell commands \n * Configuration backup \n * Update checker \n * Admin page checker \n * Brute forcer (md5 mysql...) \n * Coder (encode decode base64 hex md5...) \n * Supports MySQL \n\n \n\n\n[ ** Download jSQL Injection v0.4 ** ](<https://code.google.com/p/jsql-injection/downloads/list>)\n", "edition": 8, "enchantments": {"dependencies": {"modified": "2019-06-26T06:11:28", "references": [{"idList": ["EDB-ID:46946"], "type": "exploitdb"}, {"idList": ["MYHACK58:62201994152", "MYHACK58:62201994259", "MYHACK58:62201994154", "MYHACK58:62201994234", "MYHACK58:62201994153", "MYHACK58:62201994162"], "type": "myhack58"}, {"idList": ["MSRC:6A6ED6A5B652378DCBA3113B064E973B"], "type": "msrc"}, {"idList": ["MSF:AUXILIARY/SCANNER/RDP/CVE_2019_0708_BLUEKEEP"], "type": "metasploit"}, {"idList": ["KITPLOIT:5675461714133210469", "KITPLOIT:998955151150716619", "KITPLOIT:6059832696711755942", "KITPLOIT:251789322861126622", "KITPLOIT:5239966870858401832", "KITPLOIT:3111024978211244173", "KITPLOIT:7174876552835850849", "KITPLOIT:7754673786831913673", "KITPLOIT:3396073119433518339", "KITPLOIT:4291135670022957985"], "type": "kitploit"}, {"idList": ["SMNTC-108273"], "type": "symantec"}, {"idList": ["CVE-2019-0708"], "type": "cve"}, {"idList": ["F5:K25238311"], "type": "f5"}]}, "score": {"modified": "2019-06-26T06:11:28", "value": 4.6, "vector": "NONE"}}, "hash": "84f7e458d06deca4591611a9b94050777ca08b4a9b9b582038eca220ebeb0937", "hashmap": [{"hash": "1c02263ec9e9872fe691f0953a820220", "key": "cvelist"}, {"hash": "d170ed44ff3717127aa81f1dd8ee0d41", "key": "toolHref"}, {"hash": "283e0b2de6608f53666c45abf85f2146", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "aba454e3574969396c0dddcb45011dcc", "key": "reporter"}, {"hash": "edfca85c4c320ffaa9dcfdcb6a20ce1d", "key": "cvss"}, {"hash": "4a931512ce65bdc9ca6808adf92d8783", "key": "bulletinFamily"}, {"hash": "ea91f6ca501ac2fc96ac024dc9a8b807", "key": "description"}, {"hash": "4553be2119d862322dd6fec6bb385401", "key": "type"}, {"hash": "b9b3baecbe8a3d078563d87aff174ca7", "key": "title"}, {"hash": "4c1b2df7e41879d046db63c9344705f0", "key": "modified"}, {"hash": "4c1b2df7e41879d046db63c9344705f0", "key": "published"}], "history": [], "href": "http://www.kitploit.com/2013/05/jsql-injection-v04-java-tool-for.html", "id": "KITPLOIT:3849163972173320169", "lastseen": "2019-06-26T06:11:28", "modified": "2013-05-23T20:55:19", "objectVersion": "1.3", "published": "2013-05-23T20:55:19", "references": [], "reporter": "KitPloit", "title": "[jSQL Injection v0.4] Java tool for automatic database injection", "toolHref": "https://code.google.com/p/jsql-injection/downloads/list", "type": "kitploit", "viewCount": 0}, "differentElements": ["cvss", "cvelist"], "edition": 8, "lastseen": "2019-06-26T06:11:28"}, {"bulletin": {"bulletinFamily": "tools", "cvelist": [], "cvss": {"score": 0.0, "vector": "NONE"}, "description": "[  ](<https://2.bp.blogspot.com/-KuvD4qAAeFQ/UZ6BsNUXAsI/AAAAAAAAApw/FNyerlEhYdI/s1600/jSQL.png>)\n\n \n\n\njSQL Injection is a lightweight application used to find database information from a distant server. \n\n \n\n\njSQL is free, open source and cross-platform (Windows, Linux, Mac OS X, Solaris). \n\n \nVersion 0.4 features: \n\n\n * GET, POST, header, cookie methods \n * Normal, error based, blind, time based algorithms \n * Automatic best algorithm selection \n * Multi-thread control (start/pause/resume/stop) \n * Progression bars \n * Shows URL calls \n * Simple evasion \n * Proxy setting \n * Distant file reading \n * Webshell deposit \n * Terminal for webshell commands \n * Configuration backup \n * Update checker \n * Admin page checker \n * Brute forcer (md5 mysql...) \n * Coder (encode decode base64 hex md5...) \n * Supports MySQL \n\n \n\n\n[ ** Download jSQL Injection v0.4 ** ](<https://code.google.com/p/jsql-injection/downloads/list>)\n", "edition": 3, "enchantments": {"score": {"modified": "2018-10-01T03:20:22", "value": 5.0, "vector": "NONE"}}, "hash": "3d6a54d9ef0170c6f1fc86ad87e9d3b2189a307058a745dd337ac11e87262843", "hashmap": [{"hash": "d170ed44ff3717127aa81f1dd8ee0d41", "key": "toolHref"}, {"hash": "283e0b2de6608f53666c45abf85f2146", "key": "href"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "aba454e3574969396c0dddcb45011dcc", "key": "reporter"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "4a931512ce65bdc9ca6808adf92d8783", "key": "bulletinFamily"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "ea91f6ca501ac2fc96ac024dc9a8b807", "key": "description"}, {"hash": "4553be2119d862322dd6fec6bb385401", "key": "type"}, {"hash": "b9b3baecbe8a3d078563d87aff174ca7", "key": "title"}, {"hash": "4c1b2df7e41879d046db63c9344705f0", "key": "modified"}, {"hash": "4c1b2df7e41879d046db63c9344705f0", "key": "published"}], "history": [], "href": "http://www.kitploit.com/2013/05/jsql-injection-v04-java-tool-for.html", "id": "KITPLOIT:3849163972173320169", "lastseen": "2018-10-01T03:20:22", "modified": "2013-05-23T20:55:19", "objectVersion": "1.3", "published": "2013-05-23T20:55:19", "references": [], "reporter": "KitPloit", "title": "[jSQL Injection v0.4] Java tool for automatic database injection", "toolHref": "https://code.google.com/p/jsql-injection/downloads/list", "type": "kitploit", "viewCount": 0}, "differentElements": ["cvss", "cvelist"], "edition": 3, "lastseen": "2018-10-01T03:20:22"}], "edition": 9, "hashmap": [{"key": "bulletinFamily", "hash": "4a931512ce65bdc9ca6808adf92d8783"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "ea91f6ca501ac2fc96ac024dc9a8b807"}, {"key": "href", "hash": "283e0b2de6608f53666c45abf85f2146"}, {"key": "modified", "hash": "4c1b2df7e41879d046db63c9344705f0"}, {"key": "published", "hash": "4c1b2df7e41879d046db63c9344705f0"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "aba454e3574969396c0dddcb45011dcc"}, {"key": "title", "hash": "b9b3baecbe8a3d078563d87aff174ca7"}, {"key": "toolHref", "hash": "d170ed44ff3717127aa81f1dd8ee0d41"}, {"key": "type", "hash": "4553be2119d862322dd6fec6bb385401"}], "hash": "3d6a54d9ef0170c6f1fc86ad87e9d3b2189a307058a745dd337ac11e87262843", "viewCount": 0, "enchantments": {"dependencies": {"references": [], "modified": "2019-06-26T15:21:35"}, "score": {"value": 0.9, "vector": "NONE", "modified": "2019-06-26T15:21:35"}, "vulnersScore": 0.9}, "objectVersion": "1.3", "toolHref": "https://code.google.com/p/jsql-injection/downloads/list", "scheme": null}
{}