mirror of
https://github.com/tldr-pages/tldr.git
synced 2025-07-30 08:15:30 +02:00
sqlmap: add page (#2412)
This commit is contained in:
parent
26c0f8eefd
commit
72038e7744
1 changed files with 23 additions and 0 deletions
23
pages/common/sqlmap.md
Normal file
23
pages/common/sqlmap.md
Normal file
|
@ -0,0 +1,23 @@
|
|||
# sqlmap
|
||||
|
||||
> Detect and exploit SQL injection flaws.
|
||||
|
||||
- Run sqlmap against a single target URL:
|
||||
|
||||
`python sqlmap.py -u {{"http://www.target.com/vuln.php?id=1"}}`
|
||||
|
||||
- Send data in a POST request (`--data` implies POST request):
|
||||
|
||||
`python sqlmap.py -u {{"http://www.target.com/vuln.php" --data={{"id=1"}}`
|
||||
|
||||
- Change the parameter delimiter (& is the default):
|
||||
|
||||
`python sqlmap.py -u {{"http://www.target.com/vuln.php"}} --data={{"query=foobar;id=1"}} --param-del={{";"}}`
|
||||
|
||||
- Select a random `User-Agent` from `./txt/user-agents.txt` and use it:
|
||||
|
||||
`python sqlmap.py -u {{"http://www.target.com/vuln.php"}} --random-agent`
|
||||
|
||||
- Provide user credentials for HTTP protocol authentication:
|
||||
|
||||
`python sqlmap.py -u {{"http://www.target.com/vuln.php"}} --auth-type {{Basic}} --auth-cred {{"testuser:testpass"}}`
|
Loading…
Add table
Reference in a new issue