11/12 free views
Tool
CLI
Application Security

MapNoSQL

by Saiprasad16

4stars
0forks
1watchers
Updated about 3 years ago
About

NoSQLMap is an automated Python tool for auditing and exploiting injection vulnerabilities and default configuration weaknesses in NoSQL databases and web applications.

Automated NoSQL database enumeration and web application exploitation tool.

Primary Use Case

Security professionals and penetration testers use NoSQLMap to identify and exploit security flaws in NoSQL databases like MongoDB and CouchDB, helping to disclose or clone sensitive data. It is particularly useful for testing web applications that rely on NoSQL backends to ensure their configurations and query handling are secure.

Key Features
  • Automates injection attacks on NoSQL databases
  • Exploits default configuration weaknesses in NoSQL setups
  • Supports MongoDB and CouchDB with plans for Redis and Cassandra
  • Menu-driven CLI interface for ease of use
  • Ability to clone victim databases locally
  • Integration with Metasploit Framework for shell access
  • Supports parsing and importing Burp Suite requests
  • Docker and Docker-compose support for easy deployment

Installation

  • Run setup.sh script as root on Debian or Red Hat systems to install dependencies
  • Install Python dependencies including PyMongo, httplib2, and urllib
  • Ensure Metasploit Framework is installed if using exploitation features
  • Install a local MongoDB instance for cloning databases
  • Run 'python setup.py install' to install NoSQLMap
  • Alternatively, build Docker image by navigating to the docker directory and running 'docker build -t nosqlmap .'
  • Use Docker-compose with 'docker-compose build' and 'docker-compose run nosqlmap' to run the tool

Usage

>_ python NoSQLMap

Starts the NoSQLMap tool and presents the main menu for interaction

>_ 1-Set options

Configure target host/IP, web app port, URI path, HTTP method, local MongoDB IP, shell listener port, and load/save options

>_ 2-NoSQL DB Access Attacks

Launch attacks targeting NoSQL database access vulnerabilities

>_ 3-NoSQL Web App attacks

Perform injection and exploitation attacks against web applications using NoSQL databases

>_ 4-Scan for Anonymous MongoDB Access

Scan target servers for unsecured MongoDB instances allowing anonymous access

>_ 8-Load options from saved Burp request

Import HTTP request data saved from Burp Suite to populate attack parameters

Security Frameworks
Reconnaissance
Initial Access
Execution
Persistence
Collection
Usage Insights
  • Can be chained with Metasploit Framework for automated exploitation and post-exploitation activities.
  • Integrate into CI/CD pipelines for automated NoSQL injection vulnerability scanning during development.
  • Use Docker deployment to enable rapid testing and reduce environment setup overhead.
  • Leverage Burp Suite request import feature to replay and automate complex attack scenarios.
  • Employ as part of purple team exercises to simulate realistic NoSQL injection attacks and improve detection capabilities.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about MapNoSQL. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team85%
Blue Team35%
Purple Team60%
Details
LanguagePython
Open Issues0
Topics
couchdb
redis
security-audit
mongodb
nosql
scanner
hacking
databases
enumeration
penetration-testing