brain_fuck
CtrlK
Checklists
Checklists
  • 📁What Is It
  • 🐧Linux Hardening
    • 🏔️Privilege Escalation - Linux
      • SUDO
      • Kernel Exploit
      • SUID or SGID
      • Capabilities
      • Cron Jobs
      • PATH Hijacking
      • NFS (Network File Sharing)
  • 🖼️Windows Hardening
    • 🌋Privilege Escalation - Windows
      • Abusing dangerous privileges
      • Abusing Service Misconfigurations
      • Abusing Vulnerable Software
      • Recopilación de contraseñas en sitios habituales
      • Otras escaladas
    • 🧙‍♂️AD - Active Directory
      • Basic AD
      • Samba & NTML Relay
      • Pass The Hash (PTH)
      • Kerberoasting Attack
      • Golden Ticket & Pass The Ticket (PTT)
  • Others
    • 🧰Tools
      • Nmap
      • John the Ripper
        • zip2john
      • Gobuster
      • Smbmap
      • Smbclient
      • WPScan
      • GitHack
      • Chisel
        • Proxychains/Sock
      • Hydra
      • Msfvenom
      • CrackMapExec
      • Psexec
      • BloondHound & Ingestor
      • Rpcclient
      • Ldapdomaindump
      • Evil-wmr
      • Burpsuite
      • KeyHunter
  • 📡Ports
    • 21 - FTP
    • 22 - SSH
    • 25 - SMTP
    • 53 - DNS
    • 443 - HTTPS
    • 139;445 - SMB
    • 3389 - RDP
    • 5985 - Wsman
  • 🍎Red - Bash Scripting
    • Pivoting
  • 👨‍💻Pentesting Methodology
    • Pivoting
      • Ligolo-ng
  • 🌐OSINT
    • Gps-Coordinates
    • GPG
    • Sherlock
    • Whatsmyname
    • Wiggle
    • Image & Geospatial Intelligence
    • FFmpeg - Geolocating Videos
  • 🗒️TO-DO
  • 🪪Certifications
    • 🕷️HTB-CBBH
      • 👑CBBH Cheatsheet
      • Using Web Proxies
        • Web Proxy
        • Web Fuzzer
        • Extensions
      • Information Gathering - Web Edition
        • DNS & Subdomains
      • Attacking Web Applications with Ffuf
        • Fuzzing
        • Skills Assessment
      • JavaScript Deobfuscation
        • Deobfuscation & Decode
      • Cross-Site Scripting (XSS)
        • XSS Basics
        • XSS Phishing
        • Blind XSS - Session Hijacking
      • SQL Injection
        • Databases & Queries
        • SQL Injections
        • Exploitation
          • Database Enumeration
          • Reading Files
          • Writing Files
        • Skill Assessment
      • SQLMap Essentials
        • Building Attacks
        • Database Enumeration
        • Advanced SQLMap Usage
        • Skills Assessment
      • Command Injections
        • OS Command Injections
        • Exploitation
        • Filter Evasion
        • Skills Assessment
      • File Upload Attacks
        • Basic Explotaition
        • Bypassing Filters
        • Other Upload Attacks
        • Skills Assessment
      • Server-side Attacks
        • SSRF
        • SSTI
        • SSI
        • XSLT
        • Skills Assessment
      • Login Brute Forcing
        • Brute Force Attacks
        • Hydra
        • Medusa
        • Custom Wordlists
        • Skills Assessment
      • Broken Authentication
        • Brute-Force Attacks
        • Default Credentials
        • Authentication Bypasses
        • Session Attacks
        • Skills Assessment
      • Web Attacks
        • HTTP Verb Tampering
        • Insecure Direct Object References (IDOR)
        • XML External Entity (XXE) Injection
        • Skills Assessment
      • File Inclusion
        • File Disclosure
        • Remote Code Execution
        • Automated Scanning
        • Skills Assessment
      • Session Security
        • Session Hijacking
        • Session Fixation
        • Obtaining Session Identifiers without User Interaction
        • Cross-Site Scripting (XSS)
        • Cross-Site Request Forgery (CSRF or XSRF)
        • Cross-Site Request Forgery (GET-based)
        • Cross-Site Request Forgery (POST-based)
        • XSS & CSRF Chaining
        • Exploiting Weak CSRF Tokens
          • Additional CSRF Protection Bypasses
        • Open Redirect
        • Session Security - Skills Assessment
      • Web Service & API Attacks
        • Web Service Attacks
        • API Attacks
        • Skills Assessment
      • Hacking WordPress
        • Info
        • Enumeration
        • Exploitin
    • 📶CWP - Certified WiFiChallenge Professional
      • Capitulo 1: Teoría de redes Wi-Fi
      • Capitulo 2: WiFiChallenge Lab - Primeros Pasos
      • Capitulo 3: Fundamentos de Linux
      • Capitulo 4: Redes Wi-Fi en Linux
        • Creación de Redes Wi-Fi (Access Points)
        • Listado de herramientas Hacking Wi‑Fi
      • Capítulo 5.0: Recon Wi-Fi Ofensivo
        • Resume - 5.0
        • Challenges RECON
      • Capítulo 5.1: Ataques Wi-Fi - OPN (Redes Públicas Abiertas)
        • Challenges OPN
      • Capítulo 5.2: Ataques Wi-Fi - OWE (Opportunistic Wireless Encryption)-(WPA-3)
      • Capítulo 5.3: Ataques Wi-Fi - WEP (Wired Equivalent Privacy)
        • Challenges WEP
      • Capítulo 5.4: Ataques Wi-Fi - PSK (Pre Shared Key)
        • Optimización cracking de contraseñas
        • Challenges PSK
      • Capítulo 5.5: Ataques Wi-Fi - SAE (Simultaneous Authentication of Equals)
        • Challenges SAE
      • Capítulo 5.6: Ataques Wi-Fi - Recon MGT
        • Challenges RECON MGT
      • Capítulo 5.7: Ataques Wi-Fi - MGT
        • Ataques Wi-Fi - MGT
        • Otras funcionalidades MGT
        • Challenges MGT
Powered by GitBook
On this page
  1. 🪪Certifications
  2. 🕷️HTB-CBBH

SQLMap Essentials

677KB
Sqlmap_Essentials_Module_Cheat_Sheet.pdf
pdf
PreviousSkill AssessmentNextBuilding Attacks

Last updated 2 months ago