SQLmap
Automate SQL Injections
Documentation
https://github.com/sqlmapproject/sqlmap/wiki/Usage
From Request - HTTP:80
From Request - HTTPS:443
or the http.request file needs to have special HTTP header Host: server:443
DNS Collaborator (under root)
Tip: register new HTTP proxy on port 8081 and send all probes from sqlmap to this lister in order filter proxy history based on sqlmap listener.
Use --dns-domain
switch to instruct nmap use DNS probes against your collaborator server
Tampering
Tampering scripts for payload encoding using --tamper
switch.
A list of all existing tampering scripts is available using --list-tampers
switch or looking at github repository /tamper folder
URL target & Parameters
You can read HTTP request from a file addressing payload by asterix symbol (*).
HTTP Proxy
Databases
The most common DBMSs the remaining ones look at sqlmap wiki --dbms.
Base64 Encoding
By default sqlmap encode values in query string by URL encoding. When you need to encode payload using base64 encoding use the following switch with a parameter name
HTTP method - DELETE
Last updated
Was this helpful?