Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Katyusha Scanner — Telegram-based Fully Automated SQL Injection Tool
#1
[Image: sql-injection-tool-telegram.png]

A new powerful hacking tool recently introduced in an underground forum is making rounds these days, allowing anyone to rapidly conduct website scans for SQL injection flaws on a massive scale — all controlled from a smartphone using the Telegram messaging application.

Dubbed Katyusha Scanner, the fully automated powerful SQLi vulnerability scanner was first surfaced in April this year when a Russian-speaking individual published it on a popular hacking forum.

Researchers at Recorded Future's Insikt Group threat intelligence division found this tool for sale on an underground hacking forum for just $500. Users can even rent the Katyusha Scanner tool for $200.


According to the researchers, Katyusha Scanner is a web-based tool that's a combination of Arachni Scanner and a basic SQL Injection exploitation tool that allows users to automatically identify SQLi vulnerable sites and then exploits it to take over its databases.

Arachni is an open source vulnerability scanning tool aimed towards helping users evaluate the security of their web applications.

What makes this tool stand out of line is its 'Infrastructure-as-a-Service' model.

Full Article
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Philips healthcare infomatics solution vulnerable to SQL injection mrtrout 0 649 11-08-2021 , 02:20 AM
Last Post: mrtrout
  Fraudsters Using Telegram API to Harvest Credentials Bjyda 0 1,046 02-23-2021 , 11:25 PM
Last Post: Bjyda
  The AI Telegram bot that abused women is still out of control mrtrout 0 1,594 11-20-2020 , 12:43 AM
Last Post: mrtrout
  WordPress Plugin Bug Allows Malicious Code Injection on 100K Sites sidemoon 0 1,567 03-13-2020 , 10:00 PM
Last Post: sidemoon
  Bag Makers Fully Operational After Malware Attack dhruv2193 0 1,999 01-30-2020 , 10:45 AM
Last Post: dhruv2193



Users browsing this thread: 1 Guest(s)