This cheat sheet references a number of the mostly used sqlmap instructions. Whether or not you’re a seasoned skilled seeking to brush up in your command-line abilities or a newcomer desirous to discover the chances of networking by sqlmap, you’ll discover priceless insights and shortcuts right here.
Set up
Distribution | Command |
---|---|
Debian/Ubuntu | sudo apt-get set up sqlmap |
CentOS/Fedora/Pink Hat | sudo yum set up sqlmap |
NixOS | nix-env -iA nixos.sqlmap |
Utilization
Job | Command |
---|---|
Fundamental SQL injection check | sqlmap -u http://instance.com |
sqlmap Command Switches
Change | Description |
---|---|
--url or -u |
Goal URL to scan for SQL injection vulnerabilities. |
--data |
Retrieve the DBMS banner (model and different particulars). |
--cookie |
Use specified HTTP Cookie header worth for the requests. |
--dbs |
Enumerate DBMS databases on the goal. |
--tables |
Enumerate DBMS database tables from a selected database. |
--dump |
Dump the contents of a database desk. |
--os-shell |
Immediate for an interactive working system shell. |
--batch |
By no means ask for person enter, use default conduct. |
--banner |
Use the Tor anonymity community to make all HTTP requests. |
--tor |
Retrieve DBMS’s present person. |
--proxy |
Use a proxy to hook up with the goal URL. |
--random-agent |
Use a randomly chosen HTTP Person-Agent header worth. |
--is-dba |
Detect whether or not the DBMS present person is DBA (Database Admin). |
--technique |
SQL injection strategies to make use of (e.g., B for Boolean-based). |
--threads |
Variety of concurrent HTTP(s) requests. |
--level |
Stage of checks to carry out (1-5, default 1). |
--risk |
Threat of checks to carry out (1-3, default 1). |
--current-user |
Retrieve DBMS’s present database. |
--current-db |
Dump all databases’ desk entries. |
--count |
Retrieve the variety of entries for tables. |
--dump-all |
Use the given script(s) for tampering injection information. |
--sql-shell |
Immediate for an interactive SQL shell. |
--sql-query |
Execute the given SQL assertion towards the database. |
--tamper |
Use given script(s) for tampering injection information. |
Wrapping Up
This sqlmap cheat sheet has highlighted the device’s flexibility and energy for all the pieces from easy duties to superior operations. Mastering sqlmap can considerably increase your networking abilities. Preserve practising, exploring additional assets, and share your findings to deepen your understanding and contribute to the neighborhood’s collective information.
You Might Additionally Be In
References
This desk lists a number of the most often used switches in sqlmap
. For a complete record and detailed explanations, seek advice from the official sqlmap documentation.