SQL INJECTION (V): AUTOMATION WITH SQLMAP
- Layout for this exercise:

1 - SQLMAP
- SQLMAP is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers:
http://sqlmap.org/
- It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

- Option -u provides the URL target:

- Option --cookie specifies a cookie for connecting to the target:


- By default, let's use 1 for level and risks of the test:

- Enumeration is an ongoing process that can be run over databases, tables, columns, users, schemas, passwords, etc ...:

2 - Preparing the attack environment
- For this exercise let's use the vulnerable DVWA web application over XAMPP web server running on a Windows 10 machine.
- Taking the SQL Injection as vulnerability:

- Configuring the proxy:

- Using Burp to intercept the submission of the User ID=1:

- These two lines will be useful later, when launching the attack:


3 - Launching the attack
- Enumerating the databases with paramenter --dbs:


- Enumerating tables (--tables) at database dvwa (-D):


- Enumerating columns (--columns):


- Enumerating users, user identifiers and passwords, and giving default answers:





- The INFO notification indicates the file where the output is dumped:

