- 1、下载sqlmap
- 2、安装python
- 3、将sqlmap放入python目录下
- 4、建立快捷方式
- 5、sqlmap帮助手册
sqlmap下载链接:https://sqlmap.org/
点击此处自动跳转下载sqlmap网页
点击红框内图标进行下载sqlmap,sqlmap为python编译,需要运行在python环境下;
2、安装pythonPython下链接:https://www.python.org/getit/
点击此处自动跳转下载python网页
可以在一些软件安装的APP中进行下载,安装过程较为简单,若是已经安装python却不知道对应路径的情况可以使用PATH进行查询;
# 使用CMD查询是否安装python C:UsersAdministrator>python --version Python 3.8.5
环境变量中查询对应的python安装路径;
解压sqlmap文件,并改名为sqlmap(可以不进行修改)
将改名的sqlmap目录文件放入python运行目录下;
点击桌面,新建快捷方式;
路径为python运行目录下sqlmap的文件路径;
快捷方式如下所示:
框内填入python运行目录下sqlmap的文件路径;
结果验证:
C:UsersAdministratorAppDataLocalProgramsPythonPython38sqlmap>sqlmap.py --help ___ __H__ ___ ___[,]_____ ___ ___ {1.5.8#stable} |_ -| . [(] | .'| . | |___|_ [.]_|_|_|__,| _| |_|V... |_| http://sqlmap.org Usage: python3 sqlmap [options] Options: -h, --help Show basic help message and exit -hh Show advanced help message and exit --version Show program's version number and exit -v VERBOSE Verbosity level: 0-6 (default 1) Target: At least one of these options has to be provided to define the target(s) -u URL, --url=URL Target URL (e.g. "http://www.site.com/vuln.php?id=1") -g GOOGLEDORK Process Google dork results as target URLs Request: These options can be used to specify how to connect to the target URL --data=DATA Data string to be sent through POST (e.g. "id=1") --cookie=cookie HTTP cookie header value (e.g. "PHPSESSID=a8d127e..") --random-agent Use randomly selected HTTP User-Agent header value --proxy=PROXY Use a proxy to connect to the target URL --tor Use Tor anonymity network --check-tor Check to see if Tor is used properly Injection: These options can be used to specify which parameters to test for, provide custom injection payloads and optional tampering scripts -p TESTPARAMETER Testable parameter(s) --dbms=DBMS Force back-end DBMS to provided value Detection: These options can be used to customize the detection phase --level=LEVEL Level of tests to perform (1-5, default 1) --risk=RISK Risk of tests to perform (1-3, default 1) Techniques: These options can be used to tweak testing of specific SQL injection techniques --technique=TECH.. SQL injection techniques to use (default "BEUSTQ") Enumeration: These options can be used to enumerate the back-end database management system information, structure and data contained in the tables -a, --all Retrieve everything -b, --banner Retrieve DBMS banner --current-user Retrieve DBMS current user --current-db Retrieve DBMS current database --passwords Enumerate DBMS users password hashes 列举DBMS数据库密码hash值 --tables Enumerate DBMS database tables 列举DBMS数据库表名 --columns Enumerate DBMS database table columns 列举DBMS数据库列名 --schema Enumerate DBMS schema 列举DBMS数据库模式 --dump Dump DBMS database table entries 下载数据库DBMS表项 --dump-all Dump all DBMS databases tables entries 下载数据库DBMS所有表项 -D DB DBMS database to enumerate 指定DBMS数据库 -T TBL DBMS database table(s) to enumerate -C COL DBMS database table column(s) to enumerate Operating system access: These options can be used to access the back-end database management system underlying operating system --os-shell prompt for an interactive operating system shell --os-pwn prompt for an OOB shell, Meterpreter or VNC General: These options can be used to set some general working parameters --batch Never ask for user input, use the default behavior --flush-session Flush session files for current target Miscellaneous: These options do not fit into any other category --wizard Simple wizard interface for beginner users
欢迎分享,转载请注明来源:内存溢出
评论列表(0条)