当前位置:网站首页>Penetration tool - sqlmap
Penetration tool - sqlmap
2022-07-04 05:27:00 【In a word, the Trojan horse (the growth road of Wang an Xiaobai)】
One 、SQLMap Introduction to
1.SQLMap It's an open source SQL Injection tool , It can be used for automatic detection , You can even use SQL Inject vulnerabilities to directly obtain the permissions of the target database server . It has a powerful detection engine , Function options of penetration testing for different types of databases , Including getting the data stored in the database , Accessing operating system files can even execute operating system commands through an external data connection .
2. Supported databases :MySQL, Oracle, PostgreSQL, Microsoft SQL Server, MicrosoftAccess,IBM DB2, SQLite, Firebird, Sybase and SAP MAXDB.
Two 、SQLMap Five injection methods
- Joint injection
- An error injection
- Bull's blind note
- Time blind note
- Stack Injection
3、 ... and 、SQLMap An important parameter of
1. Parameters :-u /
Format :sqlmap -u " Target site url "
sqlmap -u "http://192.168.1.5/sqlilabs/Less-1/?id=1" id For web server IP Address
Results screenshots :
2. Parameters -m
Format :sqlmap -m file name
sqlmap -m 1.txt
Will be executed successively from the file url, You can only write one in a line url
2. Parameters :-r
Indicates loading from a file http request , Put the request packet into a file
sqlmap -r 2.txt
4. Set echo level
Parameters -v The default is 1
0: Echo only Python error message
1: Echo basic information and warning information at the same time
2: Echo at the same time debug Information
3: It also shows the injected payload
4: Show at the same time http request
5: Show at the same time http Response head
6: Show at the same time http Response request
grammar :sqlmap -u "http://192.168.1.5/sqlilabs/Less-1/?id=1" -v 3
5. Set detection level
Parameters --level
There are five levels Default level is 1,
level>=2 test http cookie
level>=3 test http user-agent/referer
level =5 test http host
The basic format :[email protected]:~/Desktop# sqlmap -r 2.txt --level 2
6. Set up http Packet related parameters
Parameters :--data hold data The following data is in post Mode submission
The basic format :[email protected]:~/Desktop# sqlmap -u "http://192.168.1.5/sqlilabs/Less-12/" --data "id=1"
7. Parameters --cookie hold cookie Parameter copy added to --cookie Back
The basic format :sqlmap -u "http://192.168.1.5/DVWA/vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie = "Cookie: security=low; PHPSESSID=c799t8hil8934arhoeipuhep54"
8. Specify test parameters
-p :sqlmap All... Will be tested by default GET and POST Parameters , When -level Is greater than or equal to 2 When it's time Can test HTTP Cookie Head value , When it is greater than or equal to 3 Will also test when User- Agents HTTP Referer Head value .
9. Set the detection risk level
Parameters :--risk There are three levels of risk ,
1-3: The default is 1 Will test most of the test statements ,
2 Time based test statements will be added ,
3 Will increase OR Of the statement SQL Injection test .
Be careful : In some cases , For example, in UPDATE, DELETE The statement of , Into a OR Test statement of , The entire table that may cause an update , May cause great risks .
10. Column data
(1)--dbs view the database
Operation format :[email protected]:~/Desktop# sqlmap -u "http://192.168.1.5/sqlilabs/Less-7/?id=1" --dbs
(2)--users View all users --password View all passwords Can be used together
Operation format :[email protected]:~/Desktop# sqlmap -u "http://192.168.1.5/sqlilabs/Less-7/?id=1" --dbs --users --password
Entry directory :cd /root/.sqlmap/output/192.168.1.5
11. Use shell command :
Parameters :--os-shell Bounce interaction shell
Premise : Need the physical path of the website , The second is the need to have FILE read-write permission
12.--tamper Bypass the injection limit
usqlmap-u"http://url/news?id=1" --tamper "base64encode.py"
边栏推荐
- VB.net 调用FFmpeg简单处理视频(类库——6)
- Letter meaning and parameter abbreviation of optical module Daquan
- [matlab] matlab simulation - low pass Gaussian white noise
- Trie number dictionary tree
- When using flash to store parameters, the code area of flash is erased, which leads to the interrupt of entering hardware error
- Encryption and decryption
- flink1.13 sql基础语法(二)join操作
- LM小型可编程控制器软件(基于CoDeSys)笔记二十一:错误3703
- Viewing and using binary log of MySQL
- LM small programmable controller software (based on CoDeSys) note XXI: error 3703
猜你喜欢
Ping port artifact psping
Appearance of LabVIEW error dialog box
补某视频网站的js,进行视频解密
LabVIEW错误对话框的出现
Simulated small root pile
[wechat applet] template and configuration (wxml, wxss, global and page configuration, network data request)
ETCD数据库源码分析——初始化总览
How to build your own knowledge engine? Community open application
Automated testing selenium foundation -- webdriverapi
Just do it with your hands 7 - * project construction details 2 - hook configuration
随机推荐
With the advent of the IP era, how can E-sports hotels take advantage of the "east wind" of games?
C # character similarity comparison general class
[QT] create mycombobox click event
Detailed comparison of Hynix emmc5.0 and 5.1 series
Automated testing selenium foundation -- webdriverapi
C language simple student management system (including source code)
[matlab] matlab simulation of modulation system - power spectrum and coherent demodulation of AM modulated signal
数据标注是一块肥肉,盯上这块肉的不止中国丨曼孚科技
PostgreSQL has officially surpassed mysql. Is this guy too strong!
云原生架构实战案例及优化解决方案
EVM proof in appliedzkp zkevm (11)
【雕爷学编程】Arduino动手做(105)---压电陶瓷振动模块
Yyds dry goods inventory TCP & UDP
2022年A特种设备相关管理(电梯)考试题模拟考试平台操作
谷歌 Chrome 浏览器将支持选取文字翻译功能
flink1.13 sql基础语法(二)join操作
Error response from daemon: You cannot remove a running container 8d6f0d2850250627cd6c2acb2497002fc3
Get the ID of the record just inserted from laravel
Evolution of system architecture: differences and connections between SOA and microservice architecture
Topological sorting and graphical display of critical path