 #### What is a Sqlmap...? **SqlMap** is an Open Source penetration testing tool that automates the process of detecting and exploiting SQL injection vulnerabilities and taking over the server database. SqlMap is also one of the automated tools for finding the most popular and powerful website vulnerabilities. With vulnerable http request urls, sqlmap can exploit remote databases and can also extract database names, tables, columns, all data in tables, etc. It can even read and write files on remote file system under certain conditions.features on sqlmap  #### Function of SqlMap as for some functions that exist in sqlmap : - Test the vulnerability and database security of a website - Exploit security vulnerabilities in application software - Perform an input filter for sending characters embedded in SQL statements or user inputs not typed correctly and unexpectedly executed. #### Features of SqlMap as for some features contained in Sqlmap : - Full support for MySQL database management system, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase and SAP MaxDB. - Full support for six SQL Injection techniques: boolean-based blind, time-based blind, error-based, UNION queries, stacked queries and out-of-band. - Support to directly connect to the database without going through SQL Injection, by providing DBMS credentials, IP addresses, ports and database names. - Support for counting users, password hashes, privileges, roles, databases, tables and columns. - Automatic introduction of password hash formats and support for cracking using dictionary based attacks. - Support to remove the entire database table, the range of specific entries or columns according to user choice. Users can also choose to remove only the number of characters from each column entry. - Support for searching for specific database names, specific tables in all databases or specific columns in all database tables. This is useful, for example, to identify tables containing custom app credentials where the relevant column names contain strings such as names and passwords. - Support for downloading and uploading any files from the database server underlying the file system on MySQL database software, PostgreSQL or Microsoft SQL Server. - Support to execute random commands and retrieve their standard output on the database server underlying the operating system when database software is MySQL, PostgreSQL or Microsoft SQL Server. #### Tutorial using SqlMap on Kali Linux 2 In this tutorial we will learn how to use sqlmap to exploit vulnerable web applications and see what can be done with Sqlmap. Then open **Sqlmap** app on Kali Linux the following command : > Applications ->> Web Application Analysis ->> sqlmap  First, open the linux terminal then if we want to know the option on sqlmap we can use the command : > sqlmap -h  **Note :** Then we specify a website that has a URL that we will test the vulnerability, for example here using the website **"http: //testphp.vulnweb.com/listproducts.php?cat=11"** which we test as knowledge about vulnerability analysis of a website. Next, to do vulnerability testing on the target website we can use the command : > sqlmap –u http: //testphp.vulnweb.com/listproducts.php?cat=1 --dbs  Then when the message **" how do you want to proceed? "** Type command **“ c ”** to continue the testing process.  Furthermore, if the message **"Do you want to keep testing the others (if any)? "** Typing the command **“ Y ”** to continue the web vulnerability testing process.  Then after scanning the web vulnerability we find two databases on the target web : **acuart** and **information_schema** > Available databases [2] : > [*] acuart > [*] information_schema  Then go to the target database and find some tables in the database we can use the command : > sqlmap –u http: //testphp.vulnweb.com/listproducts.php?cat=1 -D acuart --tables  The databases target to be tested here are **" acuart databases ".** Then we find some tables contained there are acuart databases : **artists, carts, categ, featured, guestbook, pictures, products, users.** > +---------------+ > | artists | > | carts | > | categ | > | featured | > | guestbook | > | pictures | > | products | > | users | > +---------------+  Finally, the target table in this test is the **"users"**. Then to obtain the information email, name, and password contained in the table we can use the command : > sqlmap –u http: //testphp.vulnweb.com/listproducts.php?cat=1 -D acuart -T users -C email, name, pass --dump  Then from the results of vulnerability testing on the web we can find some information of email, username and password on the database : **"acuart"** and table: **"users"** > database : acuart > Table : users > [1 entry] > +------------------------------------------------+ > | email | name | pass | > +------------------------------------------------+ > |email@emailcom |John smith | test | > +------------------------------------------------+  **Syntax Description :** - **--dbs** = to search database information - **--tables** = to search table information - **-D **= specifies the target database - **-T** = to specify the table in the database - **-C** = to specify coloumn on tabels - **--dbs** = to search database information - **--tables** = to search table information - **-D **= specifies the target database - **-T** = to specify the table in the database - **-C** = to specify coloumn on tabels - **--dbs** = to search database information - **--tables** = to search table information - **-D **= specifies the target database - **-T** = to specify the table in the database - **-C** = to specify coloumn on tabels #### Curriculum as for some Tutorials about Penetration Tools and Web Vulnerabilities on Kali Linux 2 - [Tutorial Penetration Tools #3 ](https://utopian.io/utopian-io/@fandimuhammad11/tutorial-penetration-tools-3-or-or-how-to-find-website-vulnerability-using-nikto-on-kali-linux-2-or-or-bagaimana-mencari) - [Tutorial Penetration Tools #2](https://utopian.io/utopian-io/@fandimuhammad11/tutorial-penetration-tools-2-or-or-how-to-find-security-slot-in-wordpress-using-wpscan-on-kali-linux-2-or-or-bagaimana-mencari) - [Tutorial Penetration Tools #1](https://utopian.io/utopian-io/@fandimuhammad11/tutorial-penetration-tools-1-or-or-how-to-port-scanning-using-nmap-on-kali-linux-2-or-or-bagaimana-melakukan-scanning-port) <br /><hr/><em>Posted on <a href="https://utopian.io/utopian-io/@fandimuhammad11/tutorial-penetration-tools-4-or-or-how-to-testing-website-vulnerability-by-using-sqlmap-in-kali-linux-2">Utopian.io - Rewarding Open Source Contributors</a></em><hr/>
author | fandimuhammad11 | ||||||
---|---|---|---|---|---|---|---|
permlink | tutorial-penetration-tools-4-or-or-how-to-testing-website-vulnerability-by-using-sqlmap-in-kali-linux-2 | ||||||
category | utopian-io | ||||||
json_metadata | {"community":"utopian","app":"utopian/1.0.0","format":"markdown","repository":{"id":4793392,"name":"sqlmap","full_name":"sqlmapproject/sqlmap","html_url":"https://github.com/sqlmapproject/sqlmap","fork":false,"owner":{"login":"sqlmapproject"}},"pullRequests":[],"platform":"github","type":"tutorials","tags":["utopian-io","tutorial","sqlmap","linux"],"users":["emailcom","fandimuhammad11"],"links":["https://res.cloudinary.com/hpiynhbhq/image/upload/v1518983182/buyitjahb3zsyzjolrue.jpg","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518935124/ujj71usndez76mcnde1y.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518973373/nq4wo6c2jrz6nlz6rutt.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518973834/hmfc00iw95xvlmr5u4nc.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518975325/atrpecdszykunvdjail6.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518976644/oks0vjqzusibpycrivk4.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518977083/ebmexwdk07urjdtldmrf.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518977868/u44ps1gjnckjiu8ajpxh.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518978683/phxoeg35zvu3dnpzvara.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518979296/eplwwyuzbfn7o6qj8tfb.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518980777/qbrksban1hds1qzwtd1a.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518980744/mhmbjypdvptfopzh1fwz.png","https://utopian.io/utopian-io/@fandimuhammad11/tutorial-penetration-tools-3-or-or-how-to-find-website-vulnerability-using-nikto-on-kali-linux-2-or-or-bagaimana-mencari","https://utopian.io/utopian-io/@fandimuhammad11/tutorial-penetration-tools-2-or-or-how-to-find-security-slot-in-wordpress-using-wpscan-on-kali-linux-2-or-or-bagaimana-mencari","https://utopian.io/utopian-io/@fandimuhammad11/tutorial-penetration-tools-1-or-or-how-to-port-scanning-using-nmap-on-kali-linux-2-or-or-bagaimana-melakukan-scanning-port"],"image":["https://res.cloudinary.com/hpiynhbhq/image/upload/v1518983182/buyitjahb3zsyzjolrue.jpg","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518935124/ujj71usndez76mcnde1y.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518973373/nq4wo6c2jrz6nlz6rutt.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518973834/hmfc00iw95xvlmr5u4nc.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518975325/atrpecdszykunvdjail6.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518976644/oks0vjqzusibpycrivk4.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518977083/ebmexwdk07urjdtldmrf.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518977868/u44ps1gjnckjiu8ajpxh.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518978683/phxoeg35zvu3dnpzvara.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518979296/eplwwyuzbfn7o6qj8tfb.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518980777/qbrksban1hds1qzwtd1a.png","https://res.cloudinary.com/hpiynhbhq/image/upload/v1518980744/mhmbjypdvptfopzh1fwz.png"],"moderator":{"account":"creon","time":"2018-02-19T23:15:45.327Z","reviewed":true,"pending":false,"flagged":false},"questions":null,"score":null} | ||||||
created | 2018-02-18 19:30:54 | ||||||
last_update | 2018-02-20 03:34:18 | ||||||
depth | 0 | ||||||
children | 7 | ||||||
last_payout | 2018-02-25 19:30:54 | ||||||
cashout_time | 1969-12-31 23:59:59 | ||||||
total_payout_value | 11.751 HBD | ||||||
curator_payout_value | 4.976 HBD | ||||||
pending_payout_value | 0.000 HBD | ||||||
promoted | 0.000 HBD | ||||||
body_length | 8,024 | ||||||
author_reputation | 289,708,938,437 | ||||||
root_title | "Tutorial Penetration Tools #4 || How to Testing Website Vulnerability by using SqlMap in Kali Linux 2" | ||||||
beneficiaries |
| ||||||
max_accepted_payout | 1,000,000.000 HBD | ||||||
percent_hbd | 10,000 | ||||||
post_id | 38,594,413 | ||||||
net_rshares | 3,690,733,186,476 | ||||||
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
cheetah | 0 | 2,166,780,227 | 0.08% | ||
cifer | 0 | 2,939,979,496 | 80% | ||
bobdos | 0 | 375,044,949 | 5% | ||
kosarmygin | 0 | 209,908,004 | 100% | ||
utopian-io | 0 | 3,678,516,440,092 | 2.57% | ||
steemitstats | 0 | 2,058,882,015 | 5% | ||
chelsea.bear | 0 | 2,062,471,390 | 5% | ||
rafsanj | 0 | 614,474,105 | 100% | ||
acknowledgement | 0 | 1,789,206,198 | 30% |
Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in: https://tools.kali.org/vulnerability-analysis/sqlmap
author | cheetah |
---|---|
permlink | cheetah-re-fandimuhammad11tutorial-penetration-tools-4-or-or-how-to-testing-website-vulnerability-by-using-sqlmap-in-kali-linux-2 |
category | utopian-io |
json_metadata | "" |
created | 2018-02-19 23:16:09 |
last_update | 2018-02-19 23:16:09 |
depth | 1 |
children | 0 |
last_payout | 2018-02-26 23:16:09 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 151 |
author_reputation | 942,693,160,055,713 |
root_title | "Tutorial Penetration Tools #4 || How to Testing Website Vulnerability by using SqlMap in Kali Linux 2" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 38,906,487 |
net_rshares | 0 |
Thank you for the contribution. It has been approved. You can contact us on [Discord](https://discord.gg/uTyJkNm). **[[utopian-moderator]](https://utopian.io/moderators)**
author | creon |
---|---|
permlink | re-fandimuhammad11-tutorial-penetration-tools-4-or-or-how-to-testing-website-vulnerability-by-using-sqlmap-in-kali-linux-2-20180219t231553289z |
category | utopian-io |
json_metadata | {"tags":["utopian-io"],"community":"utopian","app":"utopian/1.0.0"} |
created | 2018-02-19 23:15:54 |
last_update | 2018-02-19 23:15:54 |
depth | 1 |
children | 1 |
last_payout | 2018-02-26 23:15:54 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 172 |
author_reputation | 2,792,252,766,467 |
root_title | "Tutorial Penetration Tools #4 || How to Testing Website Vulnerability by using SqlMap in Kali Linux 2" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 38,906,442 |
net_rshares | 0 |
Thanks @creon
author | fandimuhammad11 |
---|---|
permlink | re-creon-re-fandimuhammad11-tutorial-penetration-tools-4-or-or-how-to-testing-website-vulnerability-by-using-sqlmap-in-kali-linux-2-20180220t033202406z |
category | utopian-io |
json_metadata | {"tags":["utopian-io"],"community":"utopian","app":"utopian/1.0.0"} |
created | 2018-02-20 03:32:06 |
last_update | 2018-02-20 03:32:06 |
depth | 2 |
children | 0 |
last_payout | 2018-02-27 03:32:06 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 13 |
author_reputation | 289,708,938,437 |
root_title | "Tutorial Penetration Tools #4 || How to Testing Website Vulnerability by using SqlMap in Kali Linux 2" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 38,954,605 |
net_rshares | 0 |
Congratulations @fandimuhammad11! You received a personal award! <table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@fandimuhammad11/birthday1.png</td><td>1 Year on Steemit</td></tr></table> <sub>_[Click here to view your Board](https://steemitboard.com/@fandimuhammad11)_</sub> > Support [SteemitBoard's project](https://steemit.com/@steemitboard)! **[Vote for its witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1)** and **get one more award**!
author | steemitboard |
---|---|
permlink | steemitboard-notify-fandimuhammad11-20190102t044247000z |
category | utopian-io |
json_metadata | {"image":["https://steemitboard.com/img/notify.png"]} |
created | 2019-01-02 04:42:48 |
last_update | 2019-01-02 04:42:48 |
depth | 1 |
children | 0 |
last_payout | 2019-01-09 04:42:48 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 514 |
author_reputation | 38,975,615,169,260 |
root_title | "Tutorial Penetration Tools #4 || How to Testing Website Vulnerability by using SqlMap in Kali Linux 2" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 77,740,168 |
net_rshares | 0 |
Congratulations @fandimuhammad11! You received a personal award! <table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@fandimuhammad11/birthday2.png</td><td>Happy Birthday! - You are on the Steem blockchain for 2 years!</td></tr></table> <sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@fandimuhammad11) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=fandimuhammad11)_</sub> ###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes!
author | steemitboard |
---|---|
permlink | steemitboard-notify-fandimuhammad11-20200102t050238000z |
category | utopian-io |
json_metadata | {"image":["https://steemitboard.com/img/notify.png"]} |
created | 2020-01-02 05:02:39 |
last_update | 2020-01-02 05:02:39 |
depth | 1 |
children | 0 |
last_payout | 2020-01-09 05:02:39 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 648 |
author_reputation | 38,975,615,169,260 |
root_title | "Tutorial Penetration Tools #4 || How to Testing Website Vulnerability by using SqlMap in Kali Linux 2" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 93,942,022 |
net_rshares | 0 |
@fandimuhammad11, Approve is not my ability, but I can upvote you.
author | steemitstats |
---|---|
permlink | 20180218t193149026z-post |
category | utopian-io |
json_metadata | {"tags":["utopian-io"]} |
created | 2018-02-18 19:31:51 |
last_update | 2018-02-18 19:31:51 |
depth | 1 |
children | 0 |
last_payout | 2018-02-25 19:31:51 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 66 |
author_reputation | 351,882,871,185 |
root_title | "Tutorial Penetration Tools #4 || How to Testing Website Vulnerability by using SqlMap in Kali Linux 2" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 38,594,600 |
net_rshares | 0 |
### Hey @fandimuhammad11 I am @utopian-io. I have just upvoted you! #### Achievements - You have less than 500 followers. Just gave you a gift to help you succeed! - Seems like you contribute quite often. AMAZING! #### Suggestions - Contribute more often to get higher and higher rewards. I wish to see you often! - Work on your followers to increase the votes/rewards. I follow what humans do and my vote is mainly based on that. Good luck! #### Get Noticed! - Did you know project owners can manually vote with their own voting power or by voting power delegated to their projects? Ask the project owner to review your contributions! #### Community-Driven Witness! I am the first and only Steem Community-Driven Witness. <a href="https://discord.gg/zTrEMqB">Participate on Discord</a>. Lets GROW TOGETHER! - <a href="https://v2.steemconnect.com/sign/account-witness-vote?witness=utopian-io&approve=1">Vote for my Witness With SteemConnect</a> - <a href="https://v2.steemconnect.com/sign/account-witness-proxy?proxy=utopian-io&approve=1">Proxy vote to Utopian Witness with SteemConnect</a> - Or vote/proxy on <a href="https://steemit.com/~witnesses">Steemit Witnesses</a> [](https://steemit.com/~witnesses) **Up-vote this comment to grow my power and help Open Source contributions like this one. Want to chat? Join me on Discord https://discord.gg/Pc8HG9x**
author | utopian-io |
---|---|
permlink | re-fandimuhammad11-tutorial-penetration-tools-4-or-or-how-to-testing-website-vulnerability-by-using-sqlmap-in-kali-linux-2-20180220t201254305z |
category | utopian-io |
json_metadata | {"tags":["utopian-io"],"community":"utopian","app":"utopian/1.0.0"} |
created | 2018-02-20 20:12:54 |
last_update | 2018-02-20 20:12:54 |
depth | 1 |
children | 0 |
last_payout | 2018-02-27 20:12:54 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 1,513 |
author_reputation | 152,955,367,999,756 |
root_title | "Tutorial Penetration Tools #4 || How to Testing Website Vulnerability by using SqlMap in Kali Linux 2" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 39,156,057 |
net_rshares | 0 |