SQLMap
Overview
Core Syntax
sqlmap [options] -u "URL"
sqlmap [options] -r request.txtLearning Workflow
Phase 1: Detection & Basic Testing
Target Specification
# URL with parameter (mark injectable param with *)
sqlmap -u "http://target.com/page.php?id=1"
sqlmap -u "http://target.com/page.php?id=1*&category=2"
# From Burp/ZAP saved request file
sqlmap -r request.txt
# Parse targets from sitemap
sqlmap -x "http://target.com/sitemap.xml"
# Direct database connection (for post-exploitation)
sqlmap -d "mysql://user:pass@target:3306/dbname"Request Methods
Detection Options
Injection Techniques (--technique)
--technique)Letter
Technique
Description
Quick Detection Scan
Phase 2: Enumeration
Database Fingerprinting
Information Gathering
Schema Enumeration
Standard Enumeration Workflow
Phase 3: Data Extraction
Dumping Data
Password Handling
Search Functions
Output Formats
Phase 4: Advanced Techniques
Authentication
Proxy & Traffic
Evasion Techniques
Common Tamper Scripts
Script
Purpose
Performance Optimization
Post-Exploitation
File System Access
OS Command Execution
Database Interaction
Privilege Escalation
Workflow Examples
Full Assessment Workflow
Testing From Burp Request
WAF Bypass Workflow
Session Management
Useful Flag Combinations
Quick Detection
Stealth Mode
Maximum Detection
Full Dump
Through Burp Proxy
Quick Reference Card
Task
Command
Common Issues & Fixes
Issue
Solution
Last updated