Detect and exploit SQL injection flaws.
python sqlmap.py -u "{http://www.target.com/vuln.php?id=1}"
--data
implies POST request):
python sqlmap.py -u "{http://www.target.com/vuln.php}" --data="{id=1}"
python sqlmap.py -u "{http://www.target.com/vuln.php}" --data="{query=foobar;id=1}" --param-del="{;}"
User-Agent
from ./txt/user-agents.txt
and use it:
python sqlmap.py -u "{http://www.target.com/vuln.php}" --random-agent
python sqlmap.py -u "{http://www.target.com/vuln.php}" --auth-type {Basic} --auth-cred "{testuser:testpass}"
Copyright © 2014—present the tldr-pages team and contributors.
This work is licensed under the Creative Commons Attribution 4.0 International License (CC-BY).
=> CC-BY This content has been proxied by September (ba2dc).Proxy Information
text/gemini;lang=en-GB