1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-04-23 17:42:07 +02:00
tldr/pages/common/sqlmap.md
2019-06-09 09:42:25 +05:30

24 lines
837 B
Markdown

# sqlmap
> Detect and exploit SQL injection flaws.
> More information: <https://sqlmap.org>.
- Run sqlmap against a single target URL:
`python sqlmap.py -u {{"http://www.target.com/vuln.php?id=1"}}`
- Send data in a POST request (`--data` implies POST request):
`python sqlmap.py -u {{"http://www.target.com/vuln.php"}} --data={{"id=1"}}`
- Change the parameter delimiter (& is the default):
`python sqlmap.py -u {{"http://www.target.com/vuln.php"}} --data={{"query=foobar;id=1"}} --param-del={{";"}}`
- Select a random `User-Agent` from `./txt/user-agents.txt` and use it:
`python sqlmap.py -u {{"http://www.target.com/vuln.php"}} --random-agent`
- Provide user credentials for HTTP protocol authentication:
`python sqlmap.py -u {{"http://www.target.com/vuln.php"}} --auth-type {{Basic}} --auth-cred {{"testuser:testpass"}}`