Free

How to Use SQLMap (BSWR)

Check out this “How to Use SQLMap (BSWR)” course to learn pentesting skills related to detecting and exploiting SQL injection flaws. In this “Breaking Stuff with Robert” (BSWR) session, Robert Smith walks you through SQLMap and shows you how to take over database servers, perform database fingerprinting, and execute commands on an OS.
0
8
M
Time
intermediate
difficulty
0
ceu/cpe

Course Content

SQLMap (BSWR)

8m

SQLMap (BSWR)
Course Description

Using the SQLMap Tool

The SQLMap tool is an open source penetration testing tool that is used to detect and exploit SQL injection vulnerabilities and the taking over of database servers. SQL, or Structured Query Language, is the standard language used to interact with a database. SQLMap is a tool that is helpful for penetration testers as it has a robust detection engine with various niche features and a wide range of switches. That allows penetration testers to perform database fingerprinting, access data from the database, access the underlying file system and execute commands on the operating system through out-of-band connections.

Why Use the SQLMap Tool?

SQL injection is one of the most common types of cyberattacks. It seems there is always something in the news about data dumps that contain usernames, passwords credit card information, and other sensitive data. When that happens, it’s likely that those dumps are the result of SQL injection attacks. Attackers can gain access to whatever information is included in the database when they are successful in their attacks. That’s why it’s so important to have the knowledge and skills needed to use the SQLMap tool to detect SQL injection vulnerabilities.

The SQLMap tool has a vast number of options, making it easy to test a database. It’s a python-based tool that is used for the detection and exploitation of SQL injection weaknesses. It’s a tool that every penetration tester should know how to use. SQLMap can be used to: * Scan web applications for SQL injection flaws or weaknesses * Exploit SQL injection vulnerabilities * Use tamper scripts to bypass a Web Application Firewall (WAF) * Extract a database and the database user details * Own the underlying OS and run OS level commands.

SQLMap offers full support for the following Database Management Systems (DBMS): * MySQL * Microsoft SQL Server * Microsoft Access * Oracle * SQLite * PostgreSQL * IBM DB2 * Sybase * Firebird * SAP MaxDB * Informix * HSQLDB * H2

It also provides full support for six different SQL injection techniques: error-based, time-based blind, boolean-based blind, out-of-band, stacked queries, and UNION query.

For more information about the SQLMap tool, and to learn to use it, enroll in the How to Use SQLMap tutorial. The course will teach students the basics of SQLMap and how to run the tool. Enrolling in the course is easy, just click on the Register button at the top right corner of this screen to get started.

Teaching Assistant Vikramajeet Khatri and Tahir Ibrahim

(Disclaimer: Breaking Stuff with Robert is a Cybrary series that will be running indefinitely. You will not earn CEU/CPE hours by watching any individual 'Breaking Stuff with Robert' episode. However, you can still earn a certificate of completion for each episode completed.)

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Robert Smith

I am a native to Georgia and long-time lover of technology. I initially started as a criminal justice major in my academic career but decided that I liked working with computers and people along the way. I am always seeking the next challenge and have shelves filled with books on topics like programming, penetration testing, auditing, and business.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a How to Use SQLMap (BSWR) Certificate of Completion