|
| 1 | +# Introduction |
| 2 | + |
| 3 | +sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. |
| 4 | + |
| 5 | +# Features |
| 6 | + |
| 7 | +* Full support for *MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, SQLite, Firebird, Sybase and SAP MaxDB* database management systems. |
| 8 | +* Full support for six SQL injection techniques: *boolean-based blind, time-based blind, error-based, UNION query, stacked queries and out-of-band*. |
| 9 | +* Support to *directly connect to the database* without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name. |
| 10 | +* Support to enumerate *database users, users' password hashes, users' privileges, users' roles, databases, tables and columns*. |
| 11 | +* Automatic recognition of password hashes format and support to *crack them with a dictionary-based attack*. |
| 12 | +* Support to *dump database tables* entirely, a range of entries or specific columns as per user's choice. The user can also choose to dump only a range of characters from each column's entry. |
| 13 | +* Support to *search for specific database names, specific tables across all databases or specific columns across all databases' tables*. This is useful, for instance, to identify tables containing custom application credentials where relevant columns' names contain string like name and pass. |
| 14 | +* Support to *download and upload any file* from the database server underlying file system when the database software is MySQL, PostgreSQL or Microsoft SQL Server. |
| 15 | +* Support to *execute arbitrary commands and retrieve their standard output* on the database server underlying operating system when the database software is MySQL, PostgreSQL or Microsoft SQL Server. |
| 16 | +* Support to *establish an out-of-band stateful TCP connection between the attacker machine and the database server* underlying operating system. This channel can be an interactive command prompt, a Meterpreter session or a graphical user interface (VNC) session as per user's choice. |
| 17 | +* Support for *database process' user privilege escalation* via Metasploit's Meterpreter `getsystem` command. |
| 18 | + |
| 19 | +# Mailing list |
| 20 | + |
| 21 | +The *[email protected]* mailing list is the preferred way to ask questions, report bugs, suggest new features and discuss with other users, [contributors ](https://github.com/sqlmapproject/sqlmap/blob/master/doc/THANKS) and the [developers ](#developers). To subscribe use the [online web form ](https://lists.sourceforge.net/lists/listinfo/sqlmap-users). |
| 22 | +The mailing list is archived online on [SourceForge](http://sourceforge.net/mailarchive/forum.php?forum_name=sqlmap-users), [Gmane](http://news.gmane.org/gmane.comp.security.sqlmap) and is available also via Gmane [RSS feed](http://rss.gmane.org/messages/complete/gmane.comp.security.sqlmap). |
| 23 | + |
| 24 | +# Developers |
| 25 | + |
| 26 | +[Bernardo Damele A. G. ]([email protected]) - [@inquisb](https://twitter.com/inquisb) |
| 27 | +[Miroslav Stampar ]([email protected]) - [@stamparm](https://twitter.com/stamparm) |
| 28 | + |
| 29 | +You can contact the development team by writing to [email protected]. |
| 30 | + |
| 31 | +# License |
| 32 | + |
| 33 | +sqlmap is released under the terms of the [General Public License v2](http://www.gnu.org/licenses/old-licenses/gpl-2.0.html). |
| 34 | +sqlmap is copyrighted by its [developers](#developers). |
0 commit comments