Part 14 - Exploiting SQLI
Video Activity
This lesson focuses on how to check for tables in the database using SQLMAP to check known vulnerable web pages.
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Description
This lesson focuses on how to check for tables in the database using SQLMAP to check known vulnerable web pages.
Video Transcription
00:03
>> Our next step is now to check for
00:03
the tables in that database.
00:03
Now, when we go back,
00:03
we'll decide which database that we want but we'll,
00:03
again put SQLMAP-U are known vulnerable page - -tables,
00:03
-D and then whichever
00:03
database we want to go with and as could check it out.
00:03
Here we are back here. We're going to - - tables -D,
00:03
and we're going to go with exercises.
00:03
Now we see that the exercises database
00:03
has one table and that table is users.
00:03
That is very handy.
00:03
Now we can look into
00:03
that table and find further information.
00:03
Let's go back over to our slides and check that out.
00:03
Next, we want to look at the columns in
00:03
the database website for the table users.
00:03
So that'll be - -columns -D website.
00:03
Or in our case it will be
00:03
exercises and then -T users. Let's go check it out.
00:03
We have our sqlmap -U, the page,
00:03
- -columns -D for
00:03
the database exercises and -T users for
00:03
>> the users table.
00:03
>> Let's see what info we'll get back.
00:03
From this we got age, groupid,
00:03
id, name, and then their password.
00:03
Well, how could we steal those passwords off there?
00:03
How can we get that column?
00:03
Well, we can dump
00:03
that column and view all the information.
00:03
Let's go back over our slides and check that out.
00:03
If PYTHON SQLMAP.PY -U,
00:03
so same as before, all that stuff.
00:03
We're going to do - -DUMP -D,
00:03
and then our database
00:03
-T for the table users. Let's go check it out.
00:03
Let's take columns out and type Dump.
00:03
Now the database exercise table users see the groupid,
00:03
and the id, and the age,
00:03
the name, and look at that.
00:03
We've got all of the passwords for this page,
00:03
so very handy tool to enumerate passwords,
00:03
and that's one tool that you can use to
00:03
exploit the SQL database.
00:03
Let's check out the other tool.
Up Next
Instructed By
Similar Content