POST method SQL injection with sqlmap
Sqlmap is an integrated command-line tool in Kali Linux that drastically reduces the amount of effort required to manually exploit SQL injection vulnerabilities by automating the entire process. In this recipe, we will discuss how to use the sqlmap
command to automate the testing of HTTP POST method request parameters.
Getting ready
To use the sqlmap
command to perform SQL injection against a target, you will need to have a remote system that is running one or more web applications that are vulnerable to SQL injection. In the examples provided, an instance of Metasploitable2 is used to perform this task. Metasploitable2 has several preinstalled vulnerable web applications running on the TCP port 80
. For more information on setting up Metasploitable2, refer to the Installing Metasploitable2 recipe in Chapter 1, Getting Started.
How to do it…
Let's automate the testing of HTTP POST method request parameters using the sqlmap
command:
- To perform an SQL injection...