Fbian14 0 Omg Good post friend, amazing tutorial, thanks you brother Quote Share this post Link to post Share on other sites
Jerkmemz 0 My SQLmap doesn't do email:pass email:pass Quote Share this post Link to post Share on other sites
sbyt3 1 thanks for sharing, i'm totally newbie but i heard that sqlmap is better than sqlidumper Quote Share this post Link to post Share on other sites
SSJ 207 im a fucking noob at this shit so thanks Ill try n learn from this. Quote Share this post Link to post Share on other sites
chx9638 1 Quote Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Show support for a more advanced tutorial ++ I'm not going to waste my time if people just leech. The tutorial is inside hide tags to keep the thread active. great Quote Share this post Link to post Share on other sites
everycraked 1 Quote Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Show support for a more advanced tutorial ++ I'm not going to waste my time if people just leech. The tutorial is inside hide tags to keep the thread active. Thank you for sharing it us the noobie. Quote Share this post Link to post Share on other sites
Packetss 5 Quote Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Show support for a more advanced tutorial ++ I'm not going to waste my time if people just leech. The tutorial is inside hide tags to keep the thread active. 1 Quote Share this post Link to post Share on other sites
dowzer 0 Great additions hopefully i can learn some stuff ;) Quote Share this post Link to post Share on other sites
snxwy 109 thank you so much dude. just got a huge database Quote Share this post Link to post Share on other sites