Profiling Yet Another DIY Search Engines Based Mass SQL Injection Capable Hacking Tool – An Analysis

I’ve recently spotted a currently circulating across the underground ecosystem a newly released DIY search engines based mass SQL injection capable hacking tool and I’ve decided to take a deeper look inside how the tool actually works.

Among the key features of the tool include the use of search engines for the purpose of building “hit lists” of potentially vulnerable Web sites which will be later on included in a potential mass SQL injection launching campaign in a DIY point and click fashion. The tool is capable of using a variety of publicly accessible search engines including the use of proxies for the purpose of building “hit lists” that would be later on used by the cyber attacker to launch mass SQL injection attacks.

Author: admin
Dancho Danchev is the world's leading expert in the field of cybercrime fighting and threat intelligence gathering having actively pioneered his own methodlogy for processing threat intelligence leading to a successful set of hundreas of high-quality anaysis and research articles published at the industry's leading threat intelligence blog - ZDNet's Zero Day, Dancho Danchev's Mind Streams of Information Security Knowledge and Webroot's Threat Blog with his research featured in Techmeme, ZDNet, CNN, PCWorld, SCMagazine, TheRegister, NYTimes, CNET, ComputerWorld, H+Magazine currently producing threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge. With his research featured at RSA Europe, CyberCamp, InfoSec, GCHQ and Interpol the researcher continues to actively produce threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge publishing a diverse set of hundreds of high-quality research analysis detailing the malicious and fraudulent activities at nation-state and malicious actors across the globe.

Leave a Reply

Your email address will not be published. Required fields are marked *