codingo/NoSQLMap
Fork: 579 Star: 2906 (更新于 2024-11-06 13:25:07)
license: GPL-3.0
Language: Python .
Automated NoSQL database enumeration and web application exploitation tool.
最后发布版本: 0.5 ( 2016-01-11 22:52:18)
NoSQLMap
NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases and web applications using NoSQL in order to disclose or clone data from the database.
Originally authored by @tcsstool and now maintained by @codingo_ NoSQLMap is named as a tribute to Bernardo Damele and Miroslav's Stampar's popular SQL injection tool sqlmap. Its concepts are based on and extensions of Ming Chow's excellent presentation at Defcon 21, "Abusing NoSQL Databases".
NoSQLMap MongoDB Management Attack Demo.
Screenshots
Summary
What is NoSQL?
A NoSQL (originally referring to "non SQL", "non relational" or "not only SQL") database provides a mechanism for storage and retrieval of data which is modeled in means other than the tabular relations used in relational databases. Such databases have existed since the late 1960s, but did not obtain the "NoSQL" moniker until a surge of popularity in the early twenty-first century, triggered by the needs of Web 2.0 companies such as Facebook, Google, and Amazon.com. NoSQL databases are increasingly used in big data and real-time web applications. NoSQL systems are also sometimes called "Not only SQL" to emphasize that they may support SQL-like query languages.
DBMS Support
Presently the tool's exploits are focused around MongoDB, and CouchDB but additional support for other NoSQL based platforms such as Redis, and Cassandra are planned in future releases.
Requirements
On a Debian or Red Hat based system, the setup.sh script may be run as root to automate the installation of NoSQLMap's dependencies.
Varies based on features used:
- Metasploit Framework,
- Python with PyMongo,
- httplib2,
- and urllib available.
- A local, default MongoDB instance for cloning databases to. Check here for installation instructions.
There are some various other libraries required that a normal Python installation should have readily available. Your milage may vary, check the script.
Setup
python setup.py install
Alternatively you can build a Docker image by changing to the docker directory and entering:
docker build -t nosqlmap .
or you can use Docker-compose to run Nosqlmap:
docker-compose build
docker-compose run nosqlmap
Usage Instructions
Start with
python NoSQLMap
NoSQLMap uses a menu based system for building attacks. Upon starting NoSQLMap you are presented with with the main menu:
1-Set options (do this first)
2-NoSQL DB Access Attacks
3-NoSQL Web App attacks
4-Scan for Anonymous MongoDB Access
x-Exit
Explanation of options:
1. Set target host/IP-The target web server (i.e. www.google.com) or MongoDB server you want to attack.
2. Set web app port-TCP port for the web application if a web application is the target.
3. Set URI Path-The portion of the URI containing the page name and any parameters but NOT the host name (e.g. /app/acct.php?acctid=102).
4. Set HTTP Request Method (GET/POST)-Set the request method to a GET or POST; Presently only GET is implemented but working on implementing POST requests exported from Burp.
5. Set my local Mongo/Shell IP-Set this option if attacking a MongoDB instance directly to the IP of a target Mongo installation to clone victim databases to or open Meterpreter shells to.
6. Set shell listener port-If opening Meterpreter shells, specify the port.
7. Load options file-Load a previously saved set of settings for 1-6.
8. Load options from saved Burp request-Parse a request saved from Burp Suite and populate the web application options.
9. Save options file-Save settings 1-6 for future use.
x. Back to main menu-Use this once the options are set to start your attacks.
Once options are set head back to the main menu and select DB access attacks or web app attacks as appropriate for whether you are attacking a NoSQL management port or web application. The rest of the tool is "wizard" based and fairly self explanatory, but send emails to codingo@protonmail.com or find me on Twitter @codingo_ if you have any questions or suggestions.
Vulnerable Applications
This repo also includes an intentionally vulnerable web application to test NoSQLMap with. To run this application, you need Docker installed. Then you can run the following commands from the /vuln_apps directory.
docker-compose build && docker-compose up
Once that is complete, you should be able to access the vulnerable application by visiting: https://127.0.0.1/index.html
最近版本更新:(数据更新于 2024-09-24 17:29:43)
2016-01-11 22:52:18 0.5
主题(topics):
bugbounty, couchdb, databases, enumeration, hacking, hacking-tool, hacktoberfest, mongodb, mongodb-database, nosql, nosql-databases, offensive-security, penetration-testing, redis, scanner, security-audit, security-tools, security-toolset, sql-injection, web-application-security
codingo/NoSQLMap同语言 Python最近更新仓库
2024-11-14 21:11:52 LibraHp/GetQzonehistory
2024-11-14 19:49:23 jxxghp/MoviePilot
2024-11-14 08:17:54 langflow-ai/langflow
2024-11-14 06:52:29 ultralytics/ultralytics
2024-11-14 00:25:19 Huanshere/VideoLingo
2024-11-12 16:19:07 AnswerDotAI/rerankers