sqlMap

Automatic sql mapping tool. Dangerous when not used correctly.

Usage

sqlmap -u <URL> --schema --batch

// sqlmap -u "https://0ade00760453a984801da3af00b400b7.web-security-academy.net/filter?category=Toys+%26+Games" --schema --batch

OUTPUT

Help output

└─$ sqlmap --help ___ H ___ [,]__ ___ ___ {1.7.8#stable} |_ -| . [)] | .'| . | || [)]||_|,| | ||V... |_| https://sqlmap.org

Usage: python3 sqlmap [options]

Options: -h, --help Show basic help message and exit -hh Show advanced help message and exit --version Show program's version number and exit -v VERBOSE Verbosity level: 0-6 (default 1)

Target: At least one of these options has to be provided to define the target(s)

Request: These options can be used to specify how to connect to the target URL

Injection: These options can be used to specify which parameters to test for, provide custom injection payloads and optional tampering scripts

Detection: These options can be used to customize the detection phase

Techniques: These options can be used to tweak testing of specific SQL injection techniques

Enumeration: These options can be used to enumerate the back-end database management system information, structure and data contained in the tables

Operating system access: These options can be used to access the back-end database management system underlying operating system

General: These options can be used to set some general working parameters

Miscellaneous: These options do not fit into any other category

Last updated