View Issue Details

IDProjectCategoryView StatusLast Update
0002988Kali LinuxNew Tool Requestspublic2017-07-18 13:30
Reporterg0tmi1k Assigned To 
PrioritynormalSeverityminorReproducibilityhave not tried
Status closedResolutionwon't fix 
Summary0002988: NoSQLMap
Description

Name: NoSQLMap
Version: v0.5
Homepage: http://www.nosqlmap.net/
Download: https://github.com/tcstool/NoSQLMap/archive/0.5.tar.gz
License: GNU v3 (https://raw.githubusercontent.com/tcstool/NoSQLMap/0.5/nosqlmap.py
Description: Automated Mongo database and NoSQL web application exploitation tool

What is NoSQLMap?

NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases, as well as web applications using NoSQL in order to disclose data from the database. It is named as a tribute to Bernardo Damele and Miroslav's Stampar's popular SQL injection tool SQLmap, and its concepts are based on and extensions of Ming Chow's excellent presentation at Defcon 21, "Abusing NoSQL Databases". Presently the tool's exploits are focused around MongoDB, but additional support for other NoSQL based platforms such as CouchDB, Redis, and Cassandra are planned in future releases. The current project goals are to provide a penetration testing tool to simplify attacks on MongoDB servers and web applications as well as proof of concept attacks to debunk the premise that NoSQL applications are impervious to SQL injection.

Features

Automated MongoDB and CouchDB database enumeration and cloning attacks.
Extraction of database names, users, and password hashes through MongoDB web applications.
Scanning subnets or IP lists for MongoDB and CouchDB databases with default access and enumerating versions.
Dictionary and brute force password cracking of recovered MongoDB and CouchDB hashes.
PHP application parameter injection attacks against MongoClient to return all database records.
Javascript function variable escaping and arbitrary code injection to return all database records.
Timing based attacks similar to blind SQL injection to validate Javascript injection vulnerabilities with no feedback from the application.
More coming soon!

Relationships

has duplicate 0003326 closed NoSQLMap 

Activities

UNATCO

UNATCO

2016-06-29 05:39

reporter   ~0005437

Last edited: 2016-06-29 05:42

Hey g0tmi1k,

"Elliot, you idiot!" c(-:

Is that you in the community?

I'm NOT trying to call anyone an idiot. lol

g0tmi1k

g0tmi1k

2017-07-18 13:30

administrator   ~0006916

After not much success with the tool, closing until the project is more stable & mature.

And alt to keep an eye on: https://github.com/torque59/Nosql-Exploitation-Framework

Issue History

Date Modified Username Field Change
2016-01-11 13:29 g0tmi1k New Issue
2016-01-11 14:55 g0tmi1k Description Updated
2016-06-01 08:06 g0tmi1k Relationship added has duplicate 0003326
2016-06-29 05:39 UNATCO Note Added: 0005437
2016-06-29 05:42 UNATCO Note Edited: 0005437
2017-07-18 13:30 g0tmi1k Status new => closed
2017-07-18 13:30 g0tmi1k Resolution open => won't fix
2017-07-18 13:30 g0tmi1k Note Added: 0006916