Sqlmap Dbs D T

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

 -u: This is a command-line option that specifies the target URL to test.

In this case,
the URL is "http://testsite.com".
 --banner : This is a command-line option that specifies that the tool should display
the banner message (i.e., the tool's information) before running the test.

When you run this command, sqlmap will connect to the specified website and start
testing for SQL injection vulnerabilities. The --banner option will display the tool's
information on the command line interface before the testing begins. Note that the
actual testing process may take some time to complete, depending on the complexity of
the website and the number of vulnerabilities present.

***********************************************************************

Sqlmap -u http://test.com –dbs

 --dbs : This is a command-line option that instructs sqlmap to enumerate the


available databases on the target server after it has successfully exploited a SQL
injection vulnerability.

When you run this command, sqlmap will connect to the specified website and start
testing for SQL injection vulnerabilities. Once it finds a vulnerability, it will attempt to
enumerate the available databases on the target server. The output will list the names of
all the databases it was able to identify.

************************************************************

Sqlmap -u http://test.com -D testDataBase –tables

 --tables: This is a command-line option that instructs sqlmap to enumerate the


tables within the specified database.

When you run this command, sqlmap will connect to the specified website and start
testing for SQL injection vulnerabilities. Once it finds a vulnerability, it will attempt to
access the specified database and enumerate all tables within it. The output will list the
names of all tables it was able to identify within the database.

You might also like