-
-
Notifications
You must be signed in to change notification settings - Fork 6.2k
Closed
Description
Hi,
I recently did a little research into ways to extract the SQL statement that the webpage is trying to run via SQL injection and thought it might be a cool feature to add to sqlmap. I published the research here if you want to take a quick look.
http://www.contextis.com/resources/blog/sql-inception-how-select-yourself/
The basic idea was to try and make blind SQL injection less blind especially with larger more complicated SQL statements and also to help with manual testing too. Also it can be interesting to just see the SQL that the website is running and viewing the other SQL statements in the cache can help figure out how the app works.
Feel free to use this in any way you like :)
Thanks,
Aaron
Reactions are currently unavailable