May 25, 2012

How to use SQLMap POST Request Injection

If you want to see the original post, please go to the Source. 

1. Browse to target site that have form.
2. You can use any intercept proxy to intercept Request from your web browser like Burp, OWASP Zed, etc.
3. Click the button of the form in that web page.
4. Capture and save the Request into the file. [post.txt]
5. Run SQLMap with option -r to read the post.txt to get the information to attack in that Request, -p for specific parameter to attack.


If you like my blog, Please Donate Me

1 comment:

reliable said...

Computer Support Sydney City

great article I really like it. Thanks a lot