sqlmap-database-pentesting
Automate SQL Injection Testing
This skill provides comprehensive sqlmap commands and methodologies for detecting and exploiting SQL injection vulnerabilities in web applications during authorized penetration tests.
Descargar el ZIP de la skill
Subir en Claude
Ve a Configuración → Capacidades → Skills → Subir skill
Activa y empieza a usar
Pruébalo
Usando "sqlmap-database-pentesting". Run sqlmap basic scan on http://testphp.vulnweb.com/artists.php?artist=1
Resultado esperado:
sqlmap identified the following injection point:
Parameter: artist (GET)
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE clause
Payload: artist=1 AND 5737=5737
Database: acuart
Available databases [4]:
* information_schema
* acuart
* mysql
* test
Usando "sqlmap-database-pentesting". Extract user credentials from the users table
Resultado esperado:
Database: acuart
Table: users
[3 entries]
+----------+------------------------------------------+
| username | password |
+----------+------------------------------------------+
| test | test |
| admin | 0d107d09f5bbe40cade3de5c71e9e9b7 (MD5) |
| user | 098f6bcd4621d373cade4e832627b4f6 (MD5) |
+----------+------------------------------------------+
Table: emails
[5 entries]
Table: uagents
[3 entries]
Table: artful
[88 entries]
Usando "sqlmap-database-pentesting". What are the legal requirements for using sqlmap?
Resultado esperado:
Legal Requirements for sqlmap Usage:
1. Written Authorization: Only test systems where you have explicit written permission from the system owner
2. Scope Limitations: Respect the scope defined in your engagement rules
3. Documentation: Document all testing activities and findings
4. Responsible Disclosure: Report vulnerabilities to the system owner
5. Legal Warning: Google dork attacks against unknown sites are illegal
Auditoría de seguridad
Riesgo bajoThis skill provides documentation for sqlmap, a legitimate open-source penetration testing tool. The detected patterns (external_commands, network URLs) are all documentation examples showing command syntax. Contains appropriate legal warnings about authorization requirements. All static findings are false positives - no actual command execution or unauthorized network activity.
Problemas de riesgo medio (1)
Problemas de riesgo bajo (1)
Factores de riesgo
⚙️ Comandos externos (1)
🌐 Acceso a red (1)
Puntuación de calidad
Lo que puedes crear
Web Application Security Testing
Security professionals use this skill to systematically test web applications for SQL injection vulnerabilities during authorized penetration tests.
Database Vulnerability Assessment
Developers and security teams use sqlmap to identify and verify SQL injection vulnerabilities in their applications before attackers can exploit them.
Security Education and Training
Security trainers use sqlmap in controlled environments to teach developers about SQL injection risks and secure coding practices.
Prueba estos prompts
Run sqlmap to check if http://example.com/page.php?id=1 is vulnerable to SQL injection. Use batch mode for non-interactive output.
Use sqlmap to enumerate all databases on the target http://example.com/login.php. I have written authorization to test this system.
Use sqlmap to extract the users table from the webapp database. Dump username and password columns.
The target is behind a WAF. Show me how to use sqlmap with tamper scripts to bypass the protection.
Mejores prácticas
- Always obtain written authorization before testing any system
- Start with low risk options and escalate only if necessary
- Use --batch mode for automated non-interactive scanning
- Document all findings and maintain audit trails of testing activities
Evitar
- Testing systems without explicit authorization
- Using --risk=3 or --level=5 on production systems without understanding impact
- Running sqlmap against Google dorks to find random targets
- Ignoring legal requirements and scope limitations in engagement rules
Preguntas frecuentes
What is sqlmap?
Is using sqlmap legal?
What databases does sqlmap support?
What is the difference between --dump and --dump-all?
How can I bypass a WAF when using sqlmap?
What does --os-shell do?
Detalles del desarrollador
Autor
sickn33Licencia
MIT
Repositorio
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/sqlmap-database-pentestingRef.
main
Estructura de archivos
📄 SKILL.md