-- Leo's gemini proxy

-- Connecting to freeshell.de:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

sqlmap


> Detect and exploit SQL injection flaws.

More information.


Run sqlmap against a single target URL:

python sqlmap.py -u "{http://www.target.com/vuln.php?id=1}"

Send data in a POST request (`--data` implies POST request):

python sqlmap.py -u "{http://www.target.com/vuln.php}" --data="{id=1}"

Change the parameter delimiter (& is the default):

python sqlmap.py -u "{http://www.target.com/vuln.php}" --data="{query=foobar;id=1}" --param-del="{;}"

Select a random `User-Agent` from `./txt/user-agents.txt` and use it:

python sqlmap.py -u "{http://www.target.com/vuln.php}" --random-agent

Provide user credentials for HTTP protocol authentication:

python sqlmap.py -u "{http://www.target.com/vuln.php}" --auth-type {Basic} --auth-cred "{testuser:testpass}"


> Copyright © 2014—present the tldr-pages team and contributors.

> This work is licensed under the Creative Commons Attribution 4.0 International License (CC-BY).

CC-BY



-- Response ended

-- Page fetched on Fri May 17 15:05:18 2024