Skip to main content

what is SQLMAP?

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

>> Features:

Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase and SAP MaxDB database management systems.

Full support for six SQL injection techniques: boolean-based blind, time-based blind, error-based, UNION query, stacked queries and out-of-band.

Support to directly connect to the database without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name.

Support to enumerate users, password hashes, privileges, roles, databases, tables and columns.

Automatic recognition of password hash formats and support for cracking them using a dictionary-based attack.

Support to dump database tables entirely, a range of entries or specific columns as per user’s choice. The user can also choose to dump only a range of characters from each column’s entry.

Support to search for specific database names, specific tables across all databases or specific columns across all databases’ tables. This is useful, for instance, to identify tables containing custom application credentials where relevant columns’ names contain string like name and pass.

Support to download and upload any file from the database server underlying file system when the database software is MySQL, PostgreSQL or Microsoft SQL Server.

Support to execute arbitrary commands and retrieve their standard output on the database server underlying operating system when the database software is MySQL, PostgreSQL or Microsoft SQL Server.

Support to establish an out-of-band stateful TCP connection between the attacker machine and the database server underlying operating system. This channel can be an interactive command prompt, a Meterpreter session or a graphical user interface (VNC) session as per user’s choice.

Support for database process’ user privilege escalation via Metasploit’s Meterpreter getsystem command.

Source: http://sqlmap.org/
  _________________________

Comments

Popular posts from this blog

HOW TO BYPASS OR UNBLOCK BLOCKED SITES:-

Today everyone of us is a part of any college,office or any organization. Everywhere we find free open wifi’s , but the major problem with these are there are many websites which are blocked by the servers of college,ofiice or any organization. There are different type of securities that are implemented in these server to block some sites like Facebook ,Twitter etc. So In this post i’ll tell you easy and permanent method to access or bypass blocked sites Steps To Bypass Blocked Sites-   1. Connect your pc or laptop with wifi or your broadband connection in which you want to access blocked websites.   2. Open command prompt by clicking start and the typing “cmd” and then pressing enter.   4. 3. Now a command prompt window will appear.   5. Type ping Websitename (for exp: ping http://facebook.com) and press enter.   6. Now open your browser and enter the site which you had recently ping.   7.You will see the site will get...

How to Use Your Phone as a Webcam?

A quick search on Google Play throws up several webcam applications. We tried 5 of the top 10 results, but most didn’t work properly. From the ones that didn’t crash repeatedly, SmartCam failed to show the video, and DroidCam needs you to install an app on Windows to work. IP Webcam is easily the best of the lot because it works through your browser, which gives it the cross-platform compatibility. To set up a security camera on Android, follow these steps. 1. Connect your computer and the phone to the same Wi-Fi network. 2. Install the IP Webcam app on your smartphone. 3. Close all other camera apps. Force close them from the app switcher before you proceed. 4. Launch the IP Webcam app. Scroll to the bottom and tap Start server. 5. The app will now fire up your phone’s camera and display a URL. Our URL was http://172.32.15.110:8080. 6. Enter this URL in any browser on your computer and hit Enter. 7. In the browser, you’ll see a drop down menu n...

Best Working Android Spy Apps For Your Android Apps

Spying on a Person is a difficult job if you don’t trust that person.Today am going to tell you some cool and best android spy apps review.Google Play Store is full with a ton of apps but am giving you the most top and working android spy apps. 1.IP Web Camera   IP Web Camera turns your android phone into a smart and cool spy camera or spy webcam.This app can turn your device into a  Surveillance Camera or a CCTV Camera.This app stream the video to your computer by any network.You can access android mobile camera view from ip address. Now Download this app and turn your android smart phone into a webcam spy device.   2.Automatic Call Recorder   You can easily record you calls with this awesome app.When anyone call you,you can easily record his audio and your voice chat with the help of this app.you can also record  other mobile phone calls.You can easily sync your data to google drive and dropbox with the help of this app.This app integrate with your ...