Post
------------------------------------------------------------------
1. Using the-R
Python sqlmap.py-r post.txt
Post.txt is the original HTTP request:
post/vuln.php http/1.1
Host:www.target.com
user-agent:mozilla/4.0
Id=1
2. Using--data
Python sqlmap.py-u "http://www.target.com/vuln.php"--data= "id=1"
3. Using--forms
Automatically parse form form
Python sqlmap.py-u "http://www.target.com/vuln.php"--forms
Cookies
---------------------------------------------------------------------
1 、--Cookies
Python sqlmap.py-u "http://www.target.com/vuln.php"--cookie "_ga=ga1.2.37391804.1496308052; Tz=asia%2fshanghai "
2 、--Drop-set-cookie
Ignore the HTTP response cookie settings
3 、--cookie-del= Separator
Set Cookie delimiter
4 、--load-cookies= File
Cookies stored using the Netscape/wget format
5 、--Level 2
Level 2 and above, automatic test cookie Injection
User-agent
---------------------------------------------------------------------
1 、--user-agent
Custom User-agent
2 、--random-agent
Random fetch of user-agent from./txt/user-agents.txt
3,--level 3
Level 3 and above, will automatically test user-agent injection
Host
------------------------------------------------------
1 、--Host
Manually set the HTTP host, which is taken from the URL by default
2 、--Level 5
Automatically test host injection
Referer
-----------------------------------------------------
1 、--referer
Forge Referer, no referer by default
2 、--Level 3
Automated Test Ferer Injection
--level
------------------------------------------------------
Sqlmap has a level for each payload, the higher level indicates the more payload to check
Level >= 2, test cookie
Level >=3, test user-agent, Referer
--risk
------------------------------------------------------------------------
Three tiers, risk level, how much chance to get destruction data. The values are three-to-one, indicating low and medium height.
Sqlmap Basic Use Steps (ii)