NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases, as well as web applications using NoSQL in order to disclose data from the database. It is named as a tribute to Bernardo Damele and Miroslav’s Stampar’s popular SQL injection tool SQLmap, and its concepts are based on and extensions of Ming Chow’s excellent presentation at Defcon 21, “Abusing NoSQL Databases”. Presently the tool’s exploits are focused around MongoDB, but additional support for other NoSQL based platforms such as CouchDB, Redis, and Cassandra are planned in future releases. The current project goals are to provide a penetration testing tool to simplify attacks on MongoDB servers and web applications as well as proof of concept attacks to debunk the premise that NoSQL applications are impervious to SQL injection.
· Automated MongoDB database enumeration and cloning attacks.
· Scanning subnets or IP lists for MongoDB databases with default access.
· Dictionary password cracking of recovered MongoDB hashes.
· PHP application parameter injection attacks against MongoClient to return all database records.
On a Debian or Red Hat based system, the setup.sh script may be run as root to automate the installation of NoSQLMap’s dependencies.
Varies based on features used:
· Metasploit Framework,
· Python with PyMongo,
· and urllib available.
There are some various other libraries required that a normal Python installation should have readily available. Your milage may vary, check the script.
Please Like subscribe and follow