SQL Injection
Last updated
Last updated
Options | Description |
---|---|
-u URL, --url=URL | Target URL (e.g. "http://www.site.com/vuln.php?id=1") |
--data=DATA | Data string to be sent through POST (e.g. "id=1") |
--random-agent | Use randomly selected HTTP User-Agent header value |
-p TESTPARAMETER | Testable parameter(s) |
--level=LEVEL | Level of tests to perform (1-5, default 1) |
--risk=RISK | Risk of tests to perform (1-3, default 1) |
These options can be used to enumerate the back-end database management system information, structure, and data contained in tables.
Options | Description |
-a, --all | Retrieve everything |
-b, --banner | Retrieve DBMS banner |
--current-user | Retrieve DBMS current user |
--current-db | Retrieve DBMS current database |
--passwords | Enumerate DBMS users password hashes |
--dbs | Enumerate DBMS databases |
--tables | Enumerate DBMS database tables |
--columns | Enumerate DBMS database table columns |
--schema | Enumerate DBMS schema |
--dump | Dump DBMS database table entries |
--dump-all | Dump all DBMS databases tables entries |
--is-dba | Detect if the DBMS current user is DBA |
-D <DB NAME> | DBMS database to enumerate |
-T <TABLE NAME> | DBMS database table(s) to enumerate |
-C COL | DBMS database table column(s) to enumerate |
These options can be used to access the back-end database management system on the target operating system.
Options | Description |
--os-shell | Prompt for an interactive operating system shell |
--os-pwn | Prompt for an OOB shell, Meterpreter or VNC |
--os-cmd=OSCMD | Execute an operating system command |
--priv-esc | Database process user privilege escalation |
--os-smbrelay | One-click prompt for an OOB shell, Meterpreter or VNC |