File: sqlmap.1

package info (click to toggle)
sqlmap 1.9.8-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 12,824 kB
  • sloc: python: 52,060; xml: 13,943; ansic: 989; sh: 304; makefile: 62; sql: 61; perl: 30; cpp: 27; asm: 7
file content (172 lines) | stat: -rw-r--r-- 3,677 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
.\" DO NOT MODIFY THIS FILE!  It was generated by help2man 1.49.1.
.TH SQLMAP "1" "October 2023" "sqlmap v1.7.10" "User Commands"
.SH NAME
sqlmap \- automatic SQL injection tool
.SH SYNOPSIS
.B python3
\fI\,sqlmap \/\fR[\fI\,options\/\fR]
.SH DESCRIPTION
.IP
___
.IP
__H__
.TP
___ ___[']_____ ___ ___
{1.7.10#stable}
.PP
|_ \-| . [,]     | .'| . |
|___|_  [)]_|_|_|__,|  _|
.TP
|_|V...
|_|   https://sqlmap.org
.SH OPTIONS
.TP
\fB\-h\fR, \fB\-\-help\fR
Show basic help message and exit
.TP
\fB\-hh\fR
Show advanced help message and exit
.TP
\fB\-\-version\fR
Show program's version number and exit
.TP
\fB\-v\fR VERBOSE
Verbosity level: 0\-6 (default 1)
.IP
Target:
.IP
At least one of these options has to be provided to define the
target(s)
.TP
\fB\-u\fR URL, \fB\-\-url\fR=\fI\,URL\/\fR
Target URL (e.g. "http://www.site.com/vuln.php?id=1")
.TP
\fB\-g\fR GOOGLEDORK
Process Google dork results as target URLs
.IP
Request:
.IP
These options can be used to specify how to connect to the target URL
.TP
\fB\-\-data\fR=\fI\,DATA\/\fR
Data string to be sent through POST (e.g. "id=1")
.TP
\fB\-\-cookie\fR=\fI\,COOKIE\/\fR
HTTP Cookie header value (e.g. "PHPSESSID=a8d127e..")
.TP
\fB\-\-random\-agent\fR
Use randomly selected HTTP User\-Agent header value
.TP
\fB\-\-proxy\fR=\fI\,PROXY\/\fR
Use a proxy to connect to the target URL
.TP
\fB\-\-tor\fR
Use Tor anonymity network
.TP
\fB\-\-check\-tor\fR
Check to see if Tor is used properly
.IP
Injection:
.IP
These options can be used to specify which parameters to test for,
provide custom injection payloads and optional tampering scripts
.TP
\fB\-p\fR TESTPARAMETER
Testable parameter(s)
.TP
\fB\-\-dbms\fR=\fI\,DBMS\/\fR
Force back\-end DBMS to provided value
.IP
Detection:
.IP
These options can be used to customize the detection phase
.TP
\fB\-\-level\fR=\fI\,LEVEL\/\fR
Level of tests to perform (1\-5, default 1)
.TP
\fB\-\-risk\fR=\fI\,RISK\/\fR
Risk of tests to perform (1\-3, default 1)
.IP
Techniques:
.IP
These options can be used to tweak testing of specific SQL injection
techniques
.TP
\fB\-\-technique\fR=\fI\,TECH\/\fR..
SQL injection techniques to use (default "BEUSTQ")
.IP
Enumeration:
.IP
These options can be used to enumerate the back\-end database
management system information, structure and data contained in the
tables
.TP
\fB\-a\fR, \fB\-\-all\fR
Retrieve everything
.TP
\fB\-b\fR, \fB\-\-banner\fR
Retrieve DBMS banner
.TP
\fB\-\-current\-user\fR
Retrieve DBMS current user
.TP
\fB\-\-current\-db\fR
Retrieve DBMS current database
.TP
\fB\-\-passwords\fR
Enumerate DBMS users password hashes
.TP
\fB\-\-dbs\fR
Enumerate DBMS databases
.TP
\fB\-\-tables\fR
Enumerate DBMS database tables
.TP
\fB\-\-columns\fR
Enumerate DBMS database table columns
.TP
\fB\-\-schema\fR
Enumerate DBMS schema
.TP
\fB\-\-dump\fR
Dump DBMS database table entries
.TP
\fB\-\-dump\-all\fR
Dump all DBMS databases tables entries
.TP
\fB\-D\fR DB
DBMS database to enumerate
.TP
\fB\-T\fR TBL
DBMS database table(s) to enumerate
.TP
\fB\-C\fR COL
DBMS database table column(s) to enumerate
.IP
Operating system access:
.IP
These options can be used to access the back\-end database management
system underlying operating system
.TP
\fB\-\-os\-shell\fR
Prompt for an interactive operating system shell
.TP
\fB\-\-os\-pwn\fR
Prompt for an OOB shell, Meterpreter or VNC
.IP
General:
.IP
These options can be used to set some general working parameters
.TP
\fB\-\-batch\fR
Never ask for user input, use the default behavior
.TP
\fB\-\-flush\-session\fR
Flush session files for current target
.IP
Miscellaneous:
.IP
These options do not fit into any other category
.TP
\fB\-\-wizard\fR
Simple wizard interface for beginner users