sqlmap's Risk and Level options explained (SQL Injections)

Поделиться
HTML-код
  • Опубликовано: 12 авг 2021
  • The --level and --risk options are critical to understand when using sqlmap, because they decide what tests are performed and what payloads are used when looking for SQL injections in web applications. They can make the difference between finding and not finding SQL injection vulnerabilities.
    They can also cause damage to your target applications if not used correctly. Definitely check out this video before using sqlmap in bug bounty or pentest engagements, and share with anyone else who you think needs to see this!
    Download free sqlmap cheat sheets: cybr.com/ethical-hacking-arch...
    This video was extracted from our sqlmap course: cybr.com/courses/the-practica...

Комментарии • 14

  • @jh3x507
    @jh3x507 2 года назад +4

    Excellent explanation, just what I was looking for

    • @Cybrcom
      @Cybrcom  2 года назад

      Glad to hear it, thanks for commenting!

  • @AnthonyMcqueen1987
    @AnthonyMcqueen1987 2 года назад +4

    Pure gold in my training i will use

  • @ahmmadhossain5981
    @ahmmadhossain5981 Год назад +2

    very informative 👍

  • @Free.Education786
    @Free.Education786 24 дня назад +1

    parameters do not appear to be injectable

  • @coders_algoritmers1032
    @coders_algoritmers1032 6 месяцев назад

    false positive and unexploited point detected showing in sqlmap but i check vulnerability is showing what i do

  • @exploreThe_
    @exploreThe_ 10 дней назад +1

  • @slaxblake
    @slaxblake 11 месяцев назад

    I think it is missing some points. For example level 2 also increases the base amount of payloads for each injection point, it doesn't only add HTTP cookie as inj point

  • @AkashSharma-ml2lz
    @AkashSharma-ml2lz 2 года назад

    Bro before doing SQLMap on a website from bugcrowd or any other public bugbounty platforms,.do we have to take permission from them ??

    • @Cybrcom
      @Cybrcom  2 года назад +1

      The rules of that specific program will typically indicate if automated SQL injection tools are allowed or not. But when in doubt, it's always best to ask.

  • @HarryshKumar-rt2uv
    @HarryshKumar-rt2uv Год назад

    Do you(Anyone who knows can reply) prefer using SQLMap and what are its disadvantages...

    • @Cybrcom
      @Cybrcom  Год назад +1

      Prefer using it over what?

    • @HarryshKumar-rt2uv
      @HarryshKumar-rt2uv Год назад

      @@Cybrcom Over finding nornal SQL Injection vulnerability (Without SQLMap)...

    • @Cybrcom
      @Cybrcom  Год назад

      @@HarryshKumar-rt2uv sqlmap doesn't do anything that you couldn't manually do or by writing your own scripts. It's an automation tool. If SQL injections are of interest, you need to be able to do/use both because sometimes manual is the better approach and sometimes automation is required