The Practical Guide to sqlmap for SQL Injection
-
About the CourseAbout the course
-
About the course author
-
Pre-requisites
-
Setting up our lab environmentCreating a home lab environment
-
Downloading the latest sqlmap (optional)
-
sqlmap OverviewWhat is sqlmap?
-
sqlmap: An introduction
-
Techniques used by sqlmap
-
Features and usage
-
Understanding the source code
-
Knowledge check1 Quiz
-
sqlmap Options Deep DiveNavigating the options sections
-
Using vulnserver.py
-
Main OptionsOptions
-
Target
-
Practical Knowledge Check
-
Requests OptionsHTTP headers, methods, and data
-
Cookies
-
HTTP authentication
-
Proxies and using sqlmap anonymously
-
CSRF tokens
-
General Options
-
Eval
-
Practical Knowledge Check
-
Optimizations OptionsOptimization
-
Injections OptionsInjection part 1
-
Injection part 2
-
Tamper scripts
-
Detection OptionsDetection
-
Practical Knowledge Check
-
Techniques OptionsTechniques part 1
-
Techniques part 2
-
Fingerprinting OptionsFingerprinting
-
Practical Knowledge Check
-
Enumeration OptionsEnumeration part 1
-
Enumeration part 2
-
Enumeration part 3
-
Practical Knowledge Check
-
Brute Force OptionsBrute force
-
UDF OptionsUser-defined function injection
-
File, OS, and Windows registry accessFile system access
-
Operating system access
-
Windows registry access
-
Practical knowledge check
-
General & MiscellaneousGeneral part 1
-
General part 2
-
General part 3
-
Miscellaneous
-
Practical Knowledge Check
-
sqlmap in actionInformation gathering
-
Finding an SQL injection vulnerability
-
Exploiting an SQL injection vulnerability to extract data
-
Cracking extracted password hashes
-
Bypassing WAFsWAFs overview
-
WAF identification
-
Manual WAF bypass
-
WAF bypass with sqlmap
-
Running sqlmap as an APIWhy run sqlmap as an API?
-
How to run sqlmap as an API
-
ConclusionAdditional resources
-
What now?
Really quickly before we move on, I did want to highlight some pre-requisites that you should have before taking this course.
In order to fully utilize SQLMap, it’s important that you have a solid foundation in these areas:
SQL
You should know SQL pretty well. You don’t have to be a Database Administrator, but if you don’t know what I mean by SQL, then I would stop here and I would go find a course dedicated to SQL. Then, I would recommend that you check out my Injection Attacks course, because you will also need to learn about SQL injections before you can really understand this tool. Otherwise, it’s like buying a car when you’ve never driven one before. Yes, technically you can try to drive it, but you’re probably going to crash.
Databases
What they are, how they work.
Different database engines and their differences (ie: MySQL vs SQLite).
You don’t have to be an expert in this, of course, but if you don’t understand what I mean by database engines, that would be a red flag. Stop here and go find a database course!
Web or Software Development
At least understand how applications are built, structured, and how they use databases, because otherwise finding SQL injections is going to be very difficult, and you need to be able to find potential areas of attack to configure & use sqlmap properly.
So I would say that those are the main 3 areas that you should be at least familiar with before taking this course. If any thing I said in this lesson is foreign to you, and you don’t understand it, or you’re rusty because it’s been a while since you’ve touched SQL (for example), then I would just try and brush up on that first, and then come right back and keep going!
Conclusion
That’s it, go ahead and complete this lesson, and let’s get started!
Responses