1+

Hey Folks, we have again come up with another topic which is related to sqlmap tool. In this tool tutorial we will cover the “wizard” feature of the sqlmap tool which will help speed up our work. Usually we first dump the database, then their tables, columns and so on and thus it takes a lot of time to dump the complete database of the web application, So for not doing the whole process we will just add a keyword “wizard” which will automatically dump the entire database in the web application.

Lets try it 🙂 !!

DVWA

We’ll use the DVWA vulnerable web application to demonstrate this feature of the sqlmap tool. But if you have not configured this web application then you can configure it by going here. When we enter a numeric string after it enters the SQL injection section, we get information about users on the web application, which seems like that the web application is vulnerable to the vulnerability of SQL injection.

Now at this time we will need the cookies of current users to use this tool feature. Let’s open the brupsuite tool, intercept the request and copy the highlighted text as shown in the image below.

Basic and Normal

You just need to execute the following command by changing the value of the cookie according to you. After activate the wizard feature of this tool you get level, risk and enumerate options in which we’ll select option first in both choices.

Usage 🙂 !! sqlmap -u “< URL >” –cookie < cookies > –wizard

After choosing the difficulty and risk level normal, we only obtain information related to the database present in the web application.

Medium and Intermediate

Now we will move the level of risk from normal to medium and as well as from basic to intermediate of enumeration, which means we will select the second option of the both choice.

Usage 🙂 !! sqlmap -u “< URL >” –cookie < cookies > –wizard

After increase the levels of risk and enumeration then we get a lot more information than before.

As you can see it dumped the database name, their tables, columns and user details.

High and All

Again we will move the level of risk from medium to high and as well as from intermediate to all of enumeration, which means we will select the third option of the both choice.

Usage 🙂 !! sqlmap -u “< URL >” –cookie < cookies > –wizard

Amazing 🙂 !! Now it has dumped the users’ password in clear text.

We had selected the “all” option during the choice, which is why it dumped all important information from the web server.

Done 🙂 !! Similarly, you can easily get data from any web application database by entering some numeric digit.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.

Leave a Reply