Friday, 9. December 2011
Capturing A Wpa2 4-Way Handshake, Cracking It, Using Armitage To Exploit




by
Backtrack5Tutorials

Permalink

 


NTO SQL Invader
NTO SQL Invader gives the ability to quickly and easily exploit or demonstrate SQL Injection vulnerabilities in Web applications. With a few simple clicks, you will be able to exploit a vulnerability to view the list of records,tables and user accounts of the back-end database.

Download
http://go.ntobjectives.com/

How to run the NTO SQL Invader in Ubuntu/Backtrack or any other Linux?

How to run the SQL Invader in Linux?
Requirements:
JRE 1.4 or 1.5 or 1.6 version

Step 1:
Download the .exe file from the given link.
Place it in desktop.

Step 2:
Right click on the NTOSQLInvader_Setup.exe file and click the extract here .

Now you can find a NTOSQLInvader_Setup folder in your desktop.

Step 3:
Open the folder ,there you can see three files . We are going to need "NTOSQLInvader.jar " file only. So delete other two files.

Step 4:
That's all , copy the .jar file anywhere else or leave it in Dekstop itself.
Double click the file it will start to run.
Enjoy the application in Linux also...!!

Permalink