Sqli (Advanced Usage of Sqlmap)

Hi there!,

This is the third topic in this series. You can have a look at other topics also for getting a better idea about the series and the pattern.

Third Topic - SQL Injection

I had already completed the portswigger labs and looked into many challenges of Audi Labs.
So this time, I decided to dig a little deeper into the Sqlmap tool about its working. Before this, I just knew some the basic usage of Sqlmap.

Labs

Advanced Sqlmap Usage

Parameters that I commonly use

-u URL, --url=URL   Target URL (e.g. "http://www.site.com/vuln.php?id=1")
-r REQUESTFILE      Load HTTP request from a file
-p TESTPARAMETER    Testable parameter(s)
-v VERBOSE          Verbosity level: 0-6 (default 1)
--proxy=PROXY       Use a proxy to connect to the target URL
--headers=HEADERS   Extra headers (e.g. "Accept-Language: fr\nETag: 123")
--technique=TECH..  SQL injection techniques to use (default "BEUSTQ")
--flush-session     Flush session files for current target
--skip-waf          Skip heuristic detection of WAF/IPS protection
--skip-heuristics   Skip heuristic detection of SQLi/XSS vulnerabilities
--level=LEVEL       Level of tests to perform (1-5, default 1)
--risk=RISK         Risk of tests to perform (1-3, default 1)
--dbms=DBMS         Force back-end DBMS to provided value
--tamper=TAMPER     Use given script(s) for tampering injection data
--prefix=PREFIX     Injection payload prefix string
--suffix=SUFFIX     Injection payload suffix string
--second-url=SEC..  Resulting page URL searched for second-order response

Feel free to drop any suggestions via my social handles.
Thanks for reading!!!.

Load Comments?