sqlmap/Screenshots.md
2013-03-26 03:41:26 -07:00

61 lines
1.7 KiB
Markdown

# Screenshots
Verbose output (option `-v` set to `3`):
![Verbose output set to 3](images/sqlmap_verbose_3.png)
Concatenation of three tamper scripts to obfuscate the injected SQL payloads (option `--tamper` set to `between,randomcase,space2comment`):
![Tamper scripts in action](images/sqlmap_tamper_in_action.png)
Cracking dumped databased users' password hashes (switch `--passwords`):
![Users' password hashes cracking](images/sqlmap_cracking_password_hashes.png)
Enumerating database table's columns (switch `--columns`):
![Database table's columns dump](images/sqlmap_enumerating_columns.png)
Mnemonics (option `-z` set to `"flu,ign,bat,tec=B"`):
![Mnemonics usage](images/sqlmap_mnemonics.png)
Conducting through tests only if positive heuristic(s) (switch `--smart`):
![Smart mode](images/sqlmap_smart.png)
DNS exfiltration technique (option `--dns-domain`):
![DNS exfiltration technique](images/sqlmap_dns_exfiltration.png)
Identify WAF/IDS/IPS protection (switch `--identify-waf`):
![Identify WAF/IDS/IPS protection](images/sqlmap_identify_waf.png)
HTTP parameter pollution (switch `--hpp`):
![HTTP parameter pollution](images/sqlmap_hpp.png)
Replicating table to a local SQLite3 database (option `--dump-format` set to `SQLITE`):
![Replicated table](images/sqlmap_replicate_result.png)
Dumping table to HTML format (option `--dump-format` set to `HTML`):
![Dumped table to HTML](images/sqlmap_dump_html.png)
OS pwn mode (Meterpreter) (switch `--os-pwn`):
![OS pwn mode](images/sqlmap_os_pwn.png)
OS shell mode (switch `--os-shell`):
![SQL shell mode](images/sqlmap_os_shell.png)
SQL shell mode (switch `--sql-shell`):
![SQL shell mode](images/sqlmap_sql_shell.png)
Wizard mode (switch `--wizard`):
![Wizard mode](images/sqlmap_wizard.png)