æ¤æç« åçä¸éï¼
http://pnig0s1992.blog.51cto.com/393390/402775 æ¨è
sqlmap å®ç½ï¼http://sqlmap.org/
https://github.com/sqlmapproject/sqlmap/zipball/master
sqlmap çè¿è¡éè¦pythonç¯å¢ã
ç´æ¥å°å®ç½ä¸è½½å®è£ å³å¯ã
ä¸è½½ 2.7.8 çæ¬ï¼é¾æ¥å¦ä¸ï¼
https://www.python.org/downloads/release/python-278/
ç®ä»ï¼
sqlmap æ¯å¼æºçåºäºpythonè¿è¡ç¯å¢çsqlæ³¨å ¥å·¥å ·ãæ¯æmssqlï¼mysqlï¼oracleçæ°æ®åºãå¾å¤äººç¨äºé½è¯´å¥½å¦ï¼
sqlmapåæ°ä»ç»
Usage: python sqlmap [options] #é项
Options: #é项
 -h, --help           Show basic help message and exit #æ¾ç¤ºåºæ¬ç帮å©ä¿¡æ¯å¹¶éåº
 -hh                  Show advanced help message and exit #æ¾ç¤ºé«çº§ç帮å©ä¿¡æ¯å¹¶éåº
 --version        Show program's version number and exit #æ¾ç¤ºç¨åºççæ¬å·å¹¶éåº
 -v VERBOSE           Verbosity level: 0-6 (default 1) #详ç»çº§å«ï¼0-6ï¼é»è®¤ä¸º1ï¼å³æ¾ç¤ºåºsqlmap卿³¨å ¥è¿ç¨ä¸ä½¿ç¨çæµè¯ä»£ç ççã
 Target: #ç®æ
   At least one of these options has to be provided to set the target(s)
    #è¿äºä¸çè³å°ä¸ä¸ªè¢«æä¾ç»æè®¾å®çç®æ
   -d DIRECT          Direct connection to the database
    #ç´æ¥è¿æ¥å°æ°æ®åº
   -u URL, --url=URL  Target URL (e.g. "www.target.com/vuln.php?id=1")
    #æå®ç®æ url
   -l LOGFILE         Parse targets from Burp or WebScarab proxy logs
    #ä»burpæwebscarab代ççæ¥å¿ä¸è§£ææ¥å¿
   -m BULKFILE        Scan multiple targets enlisted in a given textual file
   #æ«æç»è®°å¨ææ¬æä»¶ä¸çå¤ä¸ªç®æ
   -r REQUESTFILE     Load HTTP request from a file
    #ä»ä¸ä¸ªæä»¶ä¸è½½å ¥è¯·æ±ã常ç¨äºpostæ°æ®æäº¤æ¹å¼
   -g GOOGLEDORK      Process Google dork results as target URLs
    #å¤çgoogle dorkçç»æä½ä¸ºç®æ url
   -c CONFIGFILE      Load options from a configuration INI file
    ä»INIé ç½®æä»¶ä¸å è½½é ç½®é项
 Request: #请æ±
   These options can be used to specify how to connect to the target URL
    #è¿äºé项å¯ä»¥ç¨æ¥æå®å¦ä½è¿æ¥å°ç®æ URL
   --data=DATA        Data string to be sent through POST
    #éè¿poståéåç¬¦ä¸²æ°æ®
   --param-del=PDEL   Character used for splitting parameter values
    #ç¨äº åå²çåæ°å¼å符
   --cookie=COOKIE    HTTP Cookie header
    #æå®coockieçåæ°å¼
   --cookie-del=CDEL  Character used for splitting cookie values
   #æå®ç¨äºåå² cookieå¼çåå²ç¬¦
   --load-cookies=L.. File containing cookies in Netscape/wget format
    #å å«å¨Netscape/ wgetçæ ¼å¼çcookiesæä»¶
   --drop-set-cookie  Ignore Set-Cookie header from response
   #忽ç¥è®¾ç½®coockieçååºå¤´
   --user-agent=AGENT HTTP User-Agent header
   #æå®ä»£ççhttp user-agent头
   --random-agent     Use randomly selected HTTP User-Agent header
   #设置sqlmapæ°æ®çhttp user-agent header ä¸ºéæºä»£çæ¨¡å¼
   --host=HOST        HTTP Host header
   #设置httpçhost头为
   --referer=REFERER  HTTP Referer header
   #设置http referer çå¼ä¸ºãå³å½åè¯·æ±æ¥èªåªä¸ªé¡µé¢
   --headers=HEADERS  Extra headers (e.g. "Accept-Language: fr\nETag: 123")
   #é¢å¤ç头æä»¶ï¼å¦ï¼accept-languageï¼abc
   --auth-type=AUTH.. HTTP authentication type (Basic, Digest, NTLM or PKI)
   #设å®http éªè¯ç±»åï¼åºæ¬ï¼æè¦ï¼NTLMæPKIï¼
   --auth-cred=AUTH.. HTTP authentication credentials (name:password)
   #HTTP身份éªè¯åæ®ï¼åï¼å¯ç ï¼
   --auth-private=A.. HTTP authentication PEM private key file
   #HTTP认è¯PEMç§é¥æä»¶
   --proxy=PROXY      Use a proxy to connect to the target URL
   #使ç¨ä¸ä¸ªä»£çè¿æ¥å°ç®æ URL
   --proxy-cred=PRO.. Proxy authentication credentials (name:password)
   #代ç身份éªè¯åæ®ï¼åï¼å¯ç ï¼
   --proxy-file=PRO.. Load proxy list from a file
   #仿件å 载代çå表
   --ignore-proxy     Ignore system default proxy settings
   #忽ç¥ç³»ç»é»è®¤ç代ç设置
   --tor              Use Tor anonymity network
   #使ç¨Torå¿åç½ç»
   --tor-port=TORPORT Set Tor proxy port other than default
   #设置Torç代ç端å£
   --tor-type=TORTYPE Set Tor proxy type (HTTP (default), SOCKS4 or SOCKS5)
   #设置Torç代çç±»åï¼HTTPï¼é»è®¤ï¼ï¼SOCKS4æSOCKS5ï¼
   --check-tor        Check to see if Tor is used properly
   #è¯·æ£æ¥æ¯å¦Torçæ£ç¡®ä½¿ç¨
   --delay=DELAY      Delay in seconds between each HTTP request
   #å»¶è¿çæ¯ä¸ªHTTP请æ±ä¹é´çç§
   --timeout=TIMEOUT  Seconds to wait before timeout connection (default 30)
   #ç§è¶ æ¶è¿æ¥ä¹åè¦çå¾ ï¼é»è®¤ä¸º30ï¼
   --retries=RETRIES  Retries when the connection timeouts (default 3)
   #éè¯æ¶è¿æ¥è¶ æ¶ï¼é»è®¤3ï¼
   --randomize=RPARAM Randomly change value for given parameter(s)
   #éæºç»å®åæ°æ¹åå¼ï¼å¤ä¸ªï¼
   --safe-url=SAFURL  URL address to visit frequently during testing
   #URLå°å卿µè¯è¿ç¨ä¸é¢ç¹è®¿é®
   --safe-freq=SAFREQ Test requests between two visits to a given safe URL
   #ç»å®çå®å ¨URL两次访é®ä¹é´æµè¯è¯·æ±
   --skip-urlencode   Skip URL encoding of payload data
   #è·³è¿çææè´è½½æ°æ®çURLç¼ç
   --force-ssl        Force usage of SSL/HTTPS
   #SSLç强å¶ä½¿ç¨/ HTTPS
   --hpp              Use HTTP parameter pollution
   #使ç¨HTTPåæ°æ±¡æ
   --eval=EVALCODE    Evaluate provided Python code before the request (e.g."import hashlib;id2=hashlib.md5(id).hexdigest()")
   # 请æ±åè¯ä¼°æä¾äºPython代ç
 Optimization:
    #ä¼åï¼
   These options can be used to optimize the performance of sqlmap
   #è¿äºé项å¯ä»¥è¢«ç¨æ¥ä¼åçSqlMapçæ§è½
   -o                 Turn on all optimization switches
   #æå¼ææçå¼å ³ä¼å
   --predict-output   Predict common queries output
   #颿µå¸¸è§çæ¥è¯¢è¾åº
   --keep-alive       Use persistent HTTP(s) connections
   #ä½¿ç¨æä¹ HTTPï¼Sï¼è¿æ¥
   --null-connection  Retrieve page length without actual HTTP response body
   #æ£ç´¢é¡µé¢é¿åº¦æ²¡æå®é çHTTPååºä½
   --threads=THREADS  Max number of concurrent HTTP(s) requests (default 1)
   #å¹¶åçHTTPï¼Sï¼è¯·æ±çæå¤§æ°éï¼é»è®¤ä¸º1ï¼
   #
 Injection:
 #æ³¨å ¥
   These options can be used to specify which parameters to test for,
   provide custom injection payloads and optional tampering scripts
   #è¿äºé项å¯ä»¥è¢«ç¨æ¥æå®åªäºåæ°æ¥æµè¯ï¼æä¾èªå®ä¹çæ³¨å ¥ææè½½è·åå¯é篡æ¹èæ¬ã
   -p TESTPARAMETER   Testable parameter(s)
   #坿µè¯çåæ°ï¼Sï¼
   --skip=SKIP        Skip testing for given parameter(s)
   #è·³è¿æµè¯å¯¹äºç»å®çåé
   --dbms=DBMS        Force back-end DBMS to this value
   #æå®æ°æ®åºçç±»å
   --dbms-cred=DBMS.. DBMS authentication credentials (user:password)
   #DBMS身份éªè¯åæ®ï¼ç¨æ·åï¼å¯ç ï¼
   --os=OS            Force back-end DBMS operating system to this value
   #æå®æ°æ®åºçæä½ç³»ç»çç±»å
   --invalid-bignum   Use big numbers for invalidating values
   #ç¨å¤§æ°åç弿 æ
   --invalid-logical  Use logical operations for invalidating values
   #使ç¨é»è¾è¿ç®ç弿 æ
   --invalid-string   Use random strings for invalidating values
   #使ç¨éæºåç¬¦ä¸²å¼æ æ
   --no-cast          Turn off payload casting mechanism
   #å ³éææè½½è·é¸é æºå¶
   --no-escape        Turn off string escaping mechanism
   #å ³éåç¬¦ä¸²è½¬ä¹æºå¶
   --prefix=PREFIX    Injection payload prefix string
   #æ³¨å°ææè½½è·åç¼å符串
   --suffix=SUFFIX    Injection payload suffix string
   #æ³¨å°ææè½½è·åç¼å符串
   --tamper=TAMPER    Use given script(s) for tampering injection data
   #对äºç¯¡æ¹æ³¨å ¥æ°æ®ä½¿ç¨ç»å®çèæ¬ï¼Sï¼
 Detection:
  #æ£æµ
   These options can be used to customize the detection phase
   #è¿äºé项å¯ä»¥è¢«ç¨äºå®å¶çæ£æµé¶æ®µ
   --level=LEVEL      Level of tests to perform (1-5, default 1)
   #æµè¯æ§è¡æ°´å¹³ï¼1-5ï¼é»è®¤ä¸º1ï¼
   --risk=RISK        Risk of tests to perform (0-3, default 1)
   #æµè¯é£é©ç级ï¼0-3ï¼é»è®¤ä¸º1ï¼
   --string=STRING    String to match when query is evaluated to True
   #å符串å¹é æ¥è¯¢æ¶è¢«è¯ä¼°ä¸ºç
   --not-string=NOT.. String to match when query is evaluated to False
   #å符串å¹é æ¶ï¼æ¥è¯¢ç»æä¸ºå
   --regexp=REGEXP    Regexp to match when query is evaluated to True
   #æ£å表达å¼å¹é æ¥è¯¢æ¶è¢«è¯ä¼°ä¸ºç
   --code=CODE        HTTP code to match when query is evaluated to True
   #HTTPä»£ç æ¥å¹é æ¥è¯¢æ¶è¢«è¯ä¼°ä¸ºç
   --text-only        Compare pages based only on the textual content
   #æ¯è¾ä» åºäºææ¬å 容çç½é¡µ
   --titles           Compare pages based only on their titles
   #ä» æ ¹æ®å®ä»¬çæ 颿¯è¾é¡µ
 Techniques:
    #æå·§ï¼
   These options can be used to tweak testing of specific SQL injection
   techniques
   #è¿äºé项å¯ç¨äºè°æ´å ·ä½çSQLæ³¨å ¥ææ¯æµè¯
   --technique=TECH   SQL injection techniques to use (default "BEUSTQ")
   #SQLæ³¨å ¥ææ¯ï¼é»è®¤æ¯âBEUSTQâï¼
   --time-sec=TIMESEC Seconds to delay the DBMS response (default 5)
   #ç§å»¶è¿DBMSååºï¼é»è®¤ä¸º5ï¼
   --union-cols=UCOLS Range of columns to test for UNION query SQL injection
   #åèå´ï¼ä»¥æµè¯UNIONæ¥è¯¢SQLæ³¨å ¥
   --union-char=UCHAR Character to use for bruteforcing number of columns
   #å符ç¨äºåçæ´åç ´è§£æ°
   --union-from=UFROM Table to use in FROM part of UNION query SQL injection
   #表使ç¨ä»èåæ¥è¯¢SQLæ³¨å ¥çä¸é¨å
   --dns-domain=DNS.. Domain name used for DNS exfiltration attack
   #ååç¨äºDNSæ¸åº***
   --second-order=S.. Resulting page URL searched for second-order response
   #ç»æé¡µé¢çURLæç´¢äºé¶ååº
   #
 Fingerprint:
   #æçº¹è¯å«ï¼
   -f, --fingerprint  Perform an extensive DBMS version fingerprint
   #è¿è¡äºå¹¿æ³çDBMSçæ¬æçº¹
 Enumeration:
   #æä¸¾ï¼
   These options can be used to enumerate the back-end database
   management system information, structure and data contained in the
   tables. Moreover you can run your own SQL statements
   #è¿äºé项å¯ä»¥è¢«ç¨äºæä¸¾å å«å¨è¡¨ä¸çåç«¯æ°æ®åºç®¡çç³»ç»çä¿¡æ¯ï¼ç»æåæ°æ®ãæ¤å¤ï¼æ¨å¯ä»¥è¿è¡æ¨èªå·±çSQLè¯å¥
   -a, --all          Retrieve everything
   #æ£ç´¢ä¸å
   -b, --banner       Retrieve DBMS banner
   #æ£ç´¢DBMS banner ä¿¡æ¯
   --current-user     Retrieve DBMS current user
   #æ£ç´¢ DBMS å½åç¨æ·
   --current-db       Retrieve DBMS current database
   #æ£ç´¢ DBMS å½åæ°æ®åº
   --hostname         Retrieve DBMS server hostname
   #æ£ç´¢ DBMS æå¡å¨ä¸»æºå
   --is-dba           Detect if the DBMS current user is DBA
   #æ£æµå½åæ°æ®åºæå¨çç³»ç»ä½¿ç¨çç¨æ·èº«ä»½æ¯å¦æ¯æ°æ®åºç®¡çå
   --users            Enumerate DBMS users
   #æä¸¾dbms ç¨æ·
   --passwords        Enumerate DBMS users password hashes
   #æä¸¾ dbms ç¨æ·çå¯ç hash
   --privileges       Enumerate DBMS users privileges
   #æä¸¾ DBMS ç¨æ· ç¹æ
   --roles            Enumerate DBMS users roles
   #æä¸¾ DBMS ç¨æ· è§è²
   --dbs              Enumerate DBMS databases
   #æä¸¾ DBMS æ°æ®åº
   --tables           Enumerate DBMS database tables
   #æä¸¾ DBMSÂ æ°æ®åºç表
   --columns          Enumerate DBMS database table columns
   #æä¸¾ DBMSÂ æ°æ®åºç表å
   --schema           Enumerate DBMS schema
   #æä¸¾ DBMS æ¶æ
   --count            Retrieve number of entries for table(s)
   #æ£ç´¢è¡¨ä¸çæ¡ç®çå·ç
   --dump             Dump DBMS database table entries
   #è½¬å¨æ°æ®åºç®¡çç³»ç»çæ°æ®åºè¡¨ä¸çæ¡ç®
   --dump-all         Dump all DBMS databases tables entries
   #è½¬å¨ææçDBMSçæ°æ®åºè¡¨ä¸çæ¡ç®
   --search           Search column(s), table(s) and/or database name(s)
   #æç´¢åï¼å¤ä¸ªï¼ï¼è¡¨ï¼Sï¼å/ææ°æ®åºåï¼å¤ä¸ªï¼
   --comments         Retrieve DBMS comments
   #æ£ç´¢DBMSè¯è®º
   -D DB              DBMS database to enumerate
   #DBMSæ°æ®åºæä¸¾
   -T TBL             DBMS database table(s) to enumerate
   #DBMSçæ°æ®åºè¡¨ï¼Sï¼æä¸¾
   -C COL             DBMS database table column(s) to enumerate
   #DBMSçæ°æ®åºè¡¨åï¼Sï¼æä¸¾
   -X EXCLUDECOL      DBMS database table column(s) to not enumerate
   #DBMSçæ°æ®åºè¡¨åï¼Sï¼ä¸ä¸ä¸å举
   -U USER            DBMS user to enumerate
   #DBMSç¨æ·æä¸¾
   --exclude-sysdbs   Exclude DBMS system databases when enumerating tables
   #æä¸¾è¡¨æ¶æé¤DBMSç³»ç»æ°æ®åº
   --where=DUMPWHERE  Use WHERE condition while table dumping
   #使ç¨WHEREæ¡ä»¶ï¼è表å¾é
   --start=LIMITSTART First query output entry to retrieve
   #第ä¸ä¸ªæ¥è¯¢çè¾åºé¡¹æ£ç´¢
   --stop=LIMITSTOP   Last query output entry to retrieve
   #æåæ¥è¯¢çè¾åºé¡¹æ£ç´¢
   --first=FIRSTCHAR  First query output word character to retrieve
   #第ä¸ä¸ªæ¥è¯¢è¾åºåå符æ£ç´¢
   --last=LASTCHAR    Last query output word character to retrieve
   #æåä¸ä¸ªæ¥è¯¢è¾åºåå符æ£ç´¢
   --sql-query=QUERY  SQL statement to be executed
   #è¦æ§è¡çSQLè¯å¥
   --sql-shell        Prompt for an interactive SQL shell
   #æç¤ºä¸ä¸ªäº¤äºå¼SQLå¤å£³
   --sql-file=SQLFILE Execute SQL statements from given file(s)
   #ä»ç»å®çæä»¶æ§è¡SQLè¯å¥ï¼Sï¼
   #
 Brute force:
    #è®åï¼
   These options can be used to run brute force checks
   #è¿äºé项å¯ä»¥ç¨æ¥è¿è¡è®åæ£æ¥
   --common-tables    Check existence of common tables
   #æ£æ¥æ¯å¦åå¨å ±åç表
   --common-columns   Check existence of common columns
   #æ£æ¥æ¯å¦åå¨å ±åçå
 User-defined function injection:
    #ç¨æ·å®ä¹ç彿°æ³¨å ¥ï¼
   These options can be used to create custom user-defined functions
   #è¿äºé项å¯ä»¥è¢«ç¨äºå建å®å¶çç¨æ·å®ä¹å½æ°
   --udf-inject       Inject custom user-defined functions
   #æ³¨å ¥ç¨æ·èªå®ä¹å½æ°
   --shared-lib=SHLIB Local path of the shared library
   #å ±äº«åºçæ¬å°è·¯å¾
 File system access:
    #æä»¶ç³»ç»ç访é®ï¼
   These options can be used to access the back-end database management
   #è¿äºé项å¯ä»¥è¢«ç¨æ¥è®¿é®åç«¯æ°æ®åºç®¡ç
   system underlying file system
   #ç³»ç»åºå±æä»¶ç³»ç»
   --file-read=RFILE  Read a file from the back-end DBMS file system
   #读ä»åç«¯æ°æ®åºç®¡çç³»ç»çæä»¶ç³»ç»ä¸çæä»¶
   --file-write=WFILE Write a local file on the back-end DBMS file system
   #ååç«¯æ°æ®åºç®¡çç³»ç»çæä»¶ç³»ç»ä¸çæ¬å°æä»¶
   --file-dest=DFILE  Back-end DBMS absolute filepath to write to
   #åç«¯æ°æ®åºç®¡çç³»ç»çç»å¯¹æä»¶è·¯å¾åå ¥
 Operating system access:
    #æä½ç³»ç»è®¿é®
   These options can be used to access the back-end database management
   system underlying operating system
   #è¿äºé项å¯ä»¥è¢«ç¨æ¥è®¿é®åºå±æä½ç³»ç»çåç«¯æ°æ®åºç®¡çç³»ç»
   --os-cmd=OSCMD     Execute an operating system command
   #æ§è¡æä½ç³»ç»å½ä»¤
   --os-shell         Prompt for an interactive operating system shell
   #æç¤ºä¸ä¸ªäº¤äºå¼çæä½ç³»ç»çshell
   --os-pwn           Prompt for an OOB shell, meterpreter or VNC
   #æç¤ºä¸ä¸ªOOB壳ï¼Meterpreter就伿VNC
   --os-smbrelay      One click prompt for an OOB shell, meterpreter or VNC
   #ç¹å»æç¤ºä¸ä¸ªOOB壳ï¼Meterpreter就伿VNC
   --os-bof           Stored procedure buffer overflow exploitation
   #åå¨è¿ç¨ç¼å²åºæº¢åºå©ç¨
   --priv-esc         Database process user privilege escalation
   #æ°æ®åºè¿ç¨ç¨æ·æéæå
   --msf-path=MSFPATH Local path where Metasploit Framework is installed
   #å¨å®è£ çMetasploitæ¡æ¶æ¬å°è·¯å¾
   --tmp-path=TMPPATH Remote absolute path of temporary files directory
   #ä¸´æ¶æä»¶ç®å½çè¿ç¨ç»å¯¹è·¯å¾
 Windows registry access:
    #Windows注å表ä¸ç访é®ï¼
   These options can be used to access the back-end database management
   system Windows registry
   #è¿äºé项å¯ä»¥è¢«ç¨æ¥è®¿é®åç«¯æ°æ®åºç®¡çç³»ç»æ³¨å表
   --reg-read         Read a Windows registry key value
   #è¯»åæ³¨å表é®å¼
   --reg-add          Write a Windows registry key value data
   #ç¼åä¸ä¸ªWindows注å表ä¸çé®å¼é¡¹æ°æ®
   --reg-del          Delete a Windows registry key value
   #å 餿³¨å表é®å¼
   --reg-key=REGKEY   Windows registry key
   #Windows注å表é®
   --reg-value=REGVAL Windows registry key value
   #Windows注å表ä¸çé®å¼
   --reg-data=REGDATA Windows registry key value data
   #Windows注å表ä¸çé®å¼é¡¹æ°æ®
   --reg-type=REGTYPE Windows registry key value type
   #Windows注å表é®çå¼ç±»å
 General:
    #ä¸è¬ï¼
   These options can be used to set some general working parameters
   #è¿äºé项å¯ä»¥ç¨æ¥è®¾ç½®ä¸äºä¸è¬çå·¥ä½åæ°
   -s SESSIONFILE     Load session from a stored (.sqlite) file
   #ä»åå¨ï¼.sqliteï¼æä»¶å è½½ä¼è¯
   -t TRAFFICFILE     Log all HTTP traffic into a textual file
   #è®°å½ææHTTPæµéå°ä¸ä¸ªææ¬æä»¶
   --batch            Never ask for user input, use the default behaviour
   #仿¥æ²¡æè¦æ±ç¨æ·è¾å ¥ï¼ä½¿ç¨ç¼ºçè¡ä¸º
   --charset=CHARSET  Force character encoding used for data retrieval
   #ç¨äºæ°æ®æ£ç´¢çæ´åå符ç¼ç
   --crawl=CRAWLDEPTH Crawl the website starting from the target URL
   #æåçç®æ URLå¼å§çç½ç«
   --csv-del=CSVDEL   Delimiting character used in CSV output (default ",")
   #åå®ä¸ºCSVè¾åºä½¿ç¨çå符ï¼é»è®¤âï¼âï¼
   --dump-format=DU.. Format of dumped data (CSV (default), HTML or SQLITE)
   #è½¬å¨æ°æ®ï¼CSVï¼é»è®¤ï¼ï¼HTMLæSQLITEï¼çæ ¼å¼
   --eta              Display for each output the estimated time of arrival
   #æ¾ç¤ºæ¯ä¸ªè¾åºçé¢è®¡å°è¾¾æ¶é´
   --flush-session    Flush session files for current target
   #对äºå½åçç®æ åè±é¡ºä¼è¯æä»¶
   --forms            Parse and test forms on target URL
   #å¯¹ç®æ URLçè§£æåæµè¯å½¢å¼
   --fresh-queries    Ignore query results stored in session file
   #忽ç¥çæ¥è¯¢ç»æåå¨å¨ä¼è¯æä»¶
   --hex              Use DBMS hex function(s) for data retrieval
   #ä½¿ç¨æ°æ®åºç®¡çç³»ç»ï¼åå è¿å¶ï¼åè½ï¼å¤ä¸ªï¼æ°æ®æ£ç´¢
   --output-dir=ODIR  Custom output directory path
   #èªå®ä¹è¾åºç®å½è·¯å¾
   --parse-errors     Parse and display DBMS error messages from responses
   #è§£æå¹¶æ¾ç¤ºååºDBMSé误信æ¯
   --pivot-column=P.. Pivot column name
   #æ¢è½´åå
   --save             Save options to a configuration INI file
   #ä¿åé项å°INIé ç½®æä»¶
   --scope=SCOPE      Regexp to filter targets from provided proxy log
   #æ£åè¡¨è¾¾å¼æ¥è¿æ»¤ç®æ ï¼ä»ææä¾çä»£çæ¥å¿
   --test-filter=TE.. Select tests by payloads and/or titles (e.g. ROW)
   #ç±ææè½½è·å/ææ é¢éæ©æµè¯ï¼ä¾å¦è¡ï¼
   --update           Update sqlmap
   #æ´æ°sqlmap
 Miscellaneous:
   #å ¶ä»ï¼
   -z MNEMONICS       Use short mnemonics (e.g. "flu,bat,ban,tec=EU")
    #使ç¨çå©è®°ç¬¦ï¼å¦âflu,bat,ban,tec=EUâï¼
   --alert=ALERT      Run host OS command(s) when SQL injection is found
   #è¿è¡ä¸»æºæä½ç³»ç»å½ä»¤ï¼Sï¼æ¶ï¼SQLæ³¨å ¥è¢«åç°
   --answers=ANSWERS  Set question answers (e.g. "quit=N,follow=N")
   # éé®é¢çæ¡ï¼å¦"quit=N,follow=N"ï¼
   --beep             Make a beep sound when SQL injection is found
   #åä¸ä¸ªæç¤ºé³æ¶ï¼SQLæ³¨å ¥è¢«åç°
   --check-waf        Heuristically check for WAF/IPS/IDS protection
   #å¯å弿£æ¥WAF/ IPS/ IDSä¿æ¤
   --cleanup          Clean up the DBMS from sqlmap specific UDF and tables
   #æ¸ çä»ä¸ä¸ªSqlMapå ·ä½çUDFå表çDBMS
   --dependencies     Check for missing (non-core) sqlmap dependencies
   #æ£æ¥æ¯å¦ç¼ºå°ï¼éæ ¸å¿ï¼çSqlMapä¾èµ
   --disable-coloring Disable console output coloring
   #ç¦ç¨æ§å¶å°è¾åºçè²
   --gpage=GOOGLEPAGE Use Google dork results from specified page number
   #使ç¨è°·ædorkçç»æï¼ä»æå®ç页ç
   --identify-waf     Make a through testing for a WAF/IPS/IDS protection
   #éè¿æµè¯çWAF/ IPS/ IDSä¿æ¤ååº
   --mobile           Imitate smartphone through HTTP User-Agent header
   #éè¿HTTP User-Agent头模仿æºè½ææº
   --page-rank        Display page rank (PR) for Google dork results
   #æ¾ç¤ºç½é¡µæåï¼PRï¼ä¸ºè°·æç½ç´ç»æ
   --purge-output     Safely remove all content from output directory
   #å®å ¨å°å é¤è¾åºç®å½ä¸çææå 容
   --smart            Conduct through tests only if positive heuristic(s)
   #è¿è¡è¿æµè¯ï¼åªæç§¯æçå¯åå¼ï¼Sï¼
   --wizard           Simple wizard interface for beginner users
   #ç®åçå导çé¢ï¼ç¨äºåçº§ç¨æ·
###############################################################
以䏿¯sqlmap -hh æåºç°çææåæ°
以䏿¯æ¯sqmapç详ç»ç¨æ³
1.åºæ¬ç¨æ³
sqmap -u âæ³¨å ¥å°åâ -v 1 --dbs #åä¸¾æ°æ®åº
sqmap -u âæ³¨å ¥å°åâ -v 1 --current-db #å½åæ°æ®åº
sqmap -u âæ³¨å ¥å°åâ -v 1 --users #åæ°æ®åºç¨æ·
sqmap -u âæ³¨å ¥å°åâ -v 1 --current-user #å½åæ°æ®åºç¨æ·
sqmap -u âæ³¨å ¥å°åâ -v 1 --tables -D âæ°æ®åºåâ #åä¸¾æ°æ®åºç表å
sqmap -u âæ³¨å ¥å°åâ -v 1 --columns -T â表åâ -D âæ°æ®åºâ #è·å表çåå
sqmap -u âæ³¨å ¥å°åâ -v 1 -dump -C âåæ®µï¼å段â -T â表åâ -D âæ°æ®åºâ #è·å表ä¸çæ°æ®ï¼å å«å
sqlmap é»è®¤æåºæ¾çä½ç½®æ¯ sqlmap/output æä»¶å¤¹ä¸
2. sqlmap postæ³¨å ¥
å°postç±»åæäº¤çæ°æ®éè¿ä»£ççæ¹å¼æ¦æªä¸æ¥ï¼å¹¶ä¿å为txtæä»¶ã使ç¨sqlmap -r file.txt å½ä»¤æ§è¡æä½å³å¯ãå¦ï¼
sqlmap -r test.txt -p id
#é对test.txt æä»¶ä¸ç 请æ±å¤´åæ° id è¿è¡æµè¯ã
3ï¼sqlmap cookiesæ³¨å ¥
sqlmap.py -u âhttp://127.0.0.1/base.phpâ âcookies âid=1â³Â âdbs âlevel 2
sqlmap.py -u http://x.x.x.x/Down.aspx?tid=2 -p tid âdbms mssql âcookie=âinfo=username=testâ
-pæ¯ææå®åæ°æ³¨å ¥
4. sqlmapéå°urléåçæ³¨å ¥
åªéå卿³¨å ¥å°±å ä¸ * å·
./sqlmap.py -u âhttp://www.cunlide.com/id1/1*/id2/2â
5.sqlmap ç¼ç ç»wafæ³¨å ¥
./sqlmap.py -u http://127.0.0.1/test.php?id=1 -v 3 âdbms âMySQLâ âtechnique U -p id âbatch âtamper âspace2morehash.pyâ
å¨sqlmap ç tamperç®å½ä¸æå¾å¤space2morehash.py ç¼ç èæ¬èªè¡å è½½
6.ä¿¡æ¯è·å
sqlmap -u âhttp://url/news?id=1â âlevel=3 âsmart-v 1 -f #æçº¹å¤å«æ°æ®åºç±»å
sqlmap -u âhttp://url/news?id=1â âlevel=3 âsmartâproxyâhttp://127.0.0.1:8118â #ä»£çæ³¨å ¥
sqlmap çç¨æ³åèï¼
http://www.myhack58.com/Article/html/3/7/2013/39112.htm
转载äº:https://blog.51cto.com/meyou/1577233