Free

How to Use SQLMap (BSWR)

Check out this “How to Use SQLMap (BSWR)” course to learn pentesting skills related to detecting and exploiting SQL injection flaws. In this “Breaking Stuff with Robert” (BSWR) session, Robert Smith walks you through SQLMap and shows you how to take over database servers, perform database fingerprinting, and execute commands on an OS.
0
8
M
Time
intermediate
difficulty
0
ceu/cpe

Course Content

SQLMap (BSWR)

8m

SQLMap (BSWR)
Course Description

Using the SQLMap Tool

The SQLMap tool is an open source penetration testing tool that is used to detect and exploit SQL injection vulnerabilities and the taking over of database servers. SQL, or Structured Query Language, is the standard language used to interact with a database. SQLMap is a tool that is helpful for penetration testers as it has a robust detection engine with various niche features and a wide range of switches. That allows penetration testers to perform database fingerprinting, access data from the database, access the underlying file system and execute commands on the operating system through out-of-band connections.

Why Use the SQLMap Tool?

SQL injection is one of the most common types of cyberattacks. It seems there is always something in the news about data dumps that contain usernames, passwords credit card information, and other sensitive data. When that happens, it’s likely that those dumps are the result of SQL injection attacks. Attackers can gain access to whatever information is included in the database when they are successful in their attacks. That’s why it’s so important to have the knowledge and skills needed to use the SQLMap tool to detect SQL injection vulnerabilities.

The SQLMap tool has a vast number of options, making it easy to test a database. It’s a python-based tool that is used for the detection and exploitation of SQL injection weaknesses. It’s a tool that every penetration tester should know how to use. SQLMap can be used to: * Scan web applications for SQL injection flaws or weaknesses * Exploit SQL injection vulnerabilities * Use tamper scripts to bypass a Web Application Firewall (WAF) * Extract a database and the database user details * Own the underlying OS and run OS level commands.

SQLMap offers full support for the following Database Management Systems (DBMS): * MySQL * Microsoft SQL Server * Microsoft Access * Oracle * SQLite * PostgreSQL * IBM DB2 * Sybase * Firebird * SAP MaxDB * Informix * HSQLDB * H2

It also provides full support for six different SQL injection techniques: error-based, time-based blind, boolean-based blind, out-of-band, stacked queries, and UNION query.

For more information about the SQLMap tool, and to learn to use it, enroll in the How to Use SQLMap tutorial. The course will teach students the basics of SQLMap and how to run the tool. Enrolling in the course is easy, just click on the Register button at the top right corner of this screen to get started.

Teaching Assistant Vikramajeet Khatri and Tahir Ibrahim

(Disclaimer: Breaking Stuff with Robert is a Cybrary series that will be running indefinitely. You will not earn CEU/CPE hours by watching any individual 'Breaking Stuff with Robert' episode. However, you can still earn a certificate of completion for each episode completed.)

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Robert Smith

I am a native to Georgia and long-time lover of technology. I initially started as a criminal justice major in my academic career but decided that I liked working with computers and people along the way. I am always seeking the next challenge and have shelves filled with books on topics like programming, penetration testing, auditing, and business.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a How to Use SQLMap (BSWR) Certificate of Completion

Coming mid-July
Cybrary Reimagined.
Level up with structured, role-aligned career paths.
ALL NEW!
Cybrary Reimagined.
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Level up with structured, role-aligned career paths.
Valid until October 31. Elevate your skills today!
Start Now

Heading

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

This is some text inside of a div block.
Share

Purpose Statement

Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
This is some text inside of a div block.
This is some text inside of a div block.
M
Time
This is some text inside of a div block.
difficulty
This is some text inside of a div block.
ceu/cpe

Overview

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Frequently Asked Questions
No items found.
What Will I Learn?
Foundations
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Defensive Security
Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
Engineering and Operations
Focused on building and operating information systems.
Governance, Risk, and Compliance
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Leadership and Management
Focused on program design and oversight. Covers project and program management.
Offensive Security
Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
Offensive Security
Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
Path Outline

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

Course Outline

No items found.
No items found.
No items found.

What Our Learners Are Saying

Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

No items found.