Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to improve the blasting efficiency of sqlmap

2025-02-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

This article introduces the relevant knowledge of "how to improve the blasting efficiency of sqlmap". In the operation of actual cases, many people will encounter such a dilemma, so let the editor lead you to learn how to deal with these situations. I hope you can read it carefully and be able to achieve something!

Improve the blasting efficiency of sqlmap

After the injection is successful, sqlmap attempts to get the structure of the database and table. For databases such as MSSQL, MySQL, SQLite, etc., sqlmap can obtain the database and table structure through system databases and system data tables. But for Access databases, table names and table structures can only be obtained by blasting. At the time of explosion, sqlmap uses a built-in dictionary to operate. These dictionaries are saved in the / usr/share/sqlmap/txt directory. To provide explosive efficiency, users can expand these dictionaries. For example, common-colums.txt holds the dictionary used by the burst column; common-tables.txt holds the dictionary used by the blasting table name. When expanding, just add new words to the end of the dictionary file. The format is one per line.

This is the end of the content of "how to improve sqlmap blasting efficiency". Thank you for reading. If you want to know more about the industry, you can follow the website, the editor will output more high-quality practical articles for you!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report