Files
cheatsheet-tldr/tldr/sqlmap
2025-11-26 00:20:44 +00:00

30 lines
1.0 KiB
Plaintext

---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# sqlmap
> Detect and exploit SQL injection flaws.
> More information: <https://github.com/sqlmapproject/sqlmap/wiki/Usage>.
- Run sqlmap against a single target URL:
`python sqlmap.py {{[-u|--url]}} "{{http://www.example.com/vuln.php?id=1}}"`
- Send data in a POST request (`--data` implies POST request):
`python sqlmap.py {{[-u|--url]}} "{{http://www.example.com/vuln.php}}" --data="{{id=1}}"`
- Change the parameter delimiter (& is the default):
`python sqlmap.py {{[-u|--url]}} "{{http://www.example.com/vuln.php}}" --data="{{query=foobar;id=1}}" --param-del="{{;}}"`
- Select a random `User-Agent` from `./txt/user-agents.txt` and use it:
`python sqlmap.py {{[-u|--url]}} "{{http://www.example.com/vuln.php}}" --random-agent`
- Provide user credentials for HTTP protocol authentication:
`python sqlmap.py {{[-u|--url]}} "{{http://www.example.com/vuln.php}}" --auth-type {{Basic}} --auth-cred "{{testuser:testpass}}"`