sqlmap-ai 2.0.2__tar.gz → 2.0.7__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (36) hide show
  1. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/LICENSE +21 -21
  2. {sqlmap_ai-2.0.2/sqlmap_ai.egg-info → sqlmap_ai-2.0.7}/PKG-INFO +219 -118
  3. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/README.md +601 -501
  4. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/pyproject.toml +154 -153
  5. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/setup.py +288 -292
  6. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/__init__.py +25 -29
  7. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/adaptive_testing.py +803 -778
  8. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/advanced_reporting.py +741 -746
  9. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/ai_analyzer.py +330 -216
  10. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/cli.py +216 -215
  11. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/config_manager.py +511 -436
  12. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/enhanced_cli.py +837 -770
  13. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/evasion_engine.py +479 -483
  14. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/html_reporter.py +770 -822
  15. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/main.py +740 -559
  16. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/parser.py +236 -232
  17. sqlmap_ai-2.0.7/sqlmap_ai/run.py +364 -0
  18. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/runner.py +809 -755
  19. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/security_manager.py +553 -544
  20. sqlmap_ai-2.0.7/sqlmap_ai/startup.py +234 -0
  21. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/timeout_handler.py +40 -40
  22. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/ui.py +106 -114
  23. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7/sqlmap_ai.egg-info}/PKG-INFO +219 -118
  24. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai.egg-info/SOURCES.txt +2 -0
  25. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai.egg-info/requires.txt +1 -0
  26. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/tests/test_config_manager.py +122 -125
  27. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/tests/test_security_manager.py +147 -150
  28. sqlmap_ai-2.0.7/utils/__init__.py +3 -0
  29. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/utils/ai_providers.py +517 -509
  30. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/utils/groq_utils.py +61 -75
  31. sqlmap_ai-2.0.2/utils/__init__.py +0 -6
  32. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/setup.cfg +0 -0
  33. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/templates/report_template.html +0 -0
  34. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai.egg-info/dependency_links.txt +0 -0
  35. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai.egg-info/entry_points.txt +0 -0
  36. {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai.egg-info/top_level.txt +0 -0
@@ -1,21 +1,21 @@
1
- MIT License
2
-
3
- Copyright (c) 2024
4
-
5
- Permission is hereby granted, free of charge, to any person obtaining a copy
6
- of this software and associated documentation files (the "Software"), to deal
7
- in the Software without restriction, including without limitation the rights
8
- to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
- copies of the Software, and to permit persons to whom the Software is
10
- furnished to do so, subject to the following conditions:
11
-
12
- The above copyright notice and this permission notice shall be included in all
13
- copies or substantial portions of the Software.
14
-
15
- THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
- IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
- FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
- AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
- LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
- OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
- SOFTWARE.
1
+ MIT License
2
+
3
+ Copyright (c) 2024
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: sqlmap-ai
3
- Version: 2.0.2
3
+ Version: 2.0.7
4
4
  Summary: AI-powered SQL injection testing tool with multiple AI providers
5
5
  Home-page: https://github.com/atiilla/sqlmap-ai
6
6
  Author: Atilla
@@ -38,6 +38,7 @@ Requires-Dist: pyyaml>=6.0.1
38
38
  Requires-Dist: rich>=13.0.0
39
39
  Requires-Dist: jinja2>=3.1.2
40
40
  Requires-Dist: cryptography>=3.4.0
41
+ Requires-Dist: colorama>=0.4.6
41
42
  Provides-Extra: dev
42
43
  Requires-Dist: pytest>=7.0.0; extra == "dev"
43
44
  Requires-Dist: pytest-asyncio>=0.21.0; extra == "dev"
@@ -71,17 +72,52 @@ An AI-powered wrapper around SQLMap that makes SQL injection testing more access
71
72
 
72
73
  ## Features
73
74
 
74
- - AI-assisted SQL injection testing
75
- - Automated result analysis and next step suggestions
76
- - User-friendly output and reporting
77
- - **NEW: Adaptive step-by-step testing with DBMS-specific optimizations and WAF bypass**
78
- - **NEW: Ollama support for local AI analysis**
75
+ ### Core Features
76
+ - **AI-Assisted Testing** - Intelligent vulnerability analysis and recommendations
77
+ - **Adaptive Testing** - Step-by-step testing that adapts to target responses
78
+ - **Enhanced HTML Reports** - Beautiful, detailed reports with vulnerability details
79
+ - **Parameter Targeting** - Test specific parameters with `-p` option (like original SQLMap)
80
+ - **WAF Bypass** - Automatic tamper script selection for firewall evasion
81
+ - **Database Enumeration** - Complete database, table, and column discovery
82
+ - **Request File Support** - Test from Burp Suite, ZAP, or browser captures
83
+
84
+ ### AI Providers
85
+ - **Groq** - Fastest AI analysis (recommended)
86
+ - **OpenAI** - GPT-4 powered analysis
87
+ - **Anthropic Claude** - Advanced reasoning
88
+ - **Ollama** - Local, private AI (no cloud required)
89
+
90
+ ### New in v2.0.5
91
+ - [x] **Parameter Selection** - Target specific parameters with `-p id,username`
92
+ - [x] **Enhanced Reports** - Detailed HTML reports with tables, columns, and payloads
93
+ - [x] **Global SQLMap** - Uses your system's SQLMap installation
94
+ - [x] **Bug Fixes** - Improved database tracking and report generation
79
95
 
80
96
  <img src="sqlmap.gif"/>
81
97
 
82
98
  ## Quick Start
83
99
 
84
- ### Step 1: Install SQLMap AI
100
+ ### Step 1: Install SQLMap (Prerequisite)
101
+
102
+ First, install SQLMap globally on your system:
103
+
104
+ ```bash
105
+ # Kali/Debian/Ubuntu
106
+ sudo apt install sqlmap
107
+
108
+ # macOS
109
+ brew install sqlmap
110
+
111
+ # Or from source
112
+ git clone https://github.com/sqlmapproject/sqlmap.git
113
+ cd sqlmap
114
+ sudo python setup.py install
115
+
116
+ # Verify installation
117
+ sqlmap --version
118
+ ```
119
+
120
+ ### Step 2: Install SQLMap AI
85
121
 
86
122
  ```bash
87
123
  # Clone the repository
@@ -91,13 +127,14 @@ cd sqlmap-ai
91
127
  # Install the package
92
128
  pip install -e .
93
129
 
94
- # Run installation check (sets up SQLMap and creates config files)
95
- sqlmap-ai --install-check
96
-
130
+ # Or install from PyPI
97
131
  pip install sqlmap-ai
132
+
133
+ # Run installation check (creates config files)
134
+ sqlmap-ai --install-check
98
135
  ```
99
136
 
100
- ### Step 2: Configure AI Providers
137
+ ### Step 3: Configure AI Providers
101
138
 
102
139
  Choose one or more AI providers to use:
103
140
 
@@ -138,7 +175,7 @@ ENABLE_OLLAMA=true
138
175
  OLLAMA_MODEL=llama3.2
139
176
  ```
140
177
 
141
- ### Step 3: Run Configuration Wizard
178
+ ### Step 4: Run Configuration Wizard
142
179
 
143
180
  ```bash
144
181
  # Interactive setup
@@ -151,7 +188,7 @@ This will:
151
188
  - Configure security settings
152
189
  - Set up SQLMap options
153
190
 
154
- ### Step 4: Test Your Setup
191
+ ### Step 5: Test Your Setup
155
192
 
156
193
  ```bash
157
194
  # Check if everything is working
@@ -231,13 +268,22 @@ username=admin&password=test
231
268
 
232
269
  ```bash
233
270
  # Adaptive testing (recommended)
234
- sqlmap-ai --adaptive
271
+ sqlmap-ai --enhanced --adaptive -u "http://example.com/page.php?id=1"
272
+
273
+ # Test specific parameter only
274
+ sqlmap-ai --enhanced -u "http://example.com/page.php?id=1&name=test" -p id
235
275
 
236
276
  # Simple mode (basic SQLMap without AI)
237
277
  sqlmap-ai --simple -u "http://example.com/page.php?id=1"
238
278
 
239
279
  # Enhanced mode with custom options
240
280
  sqlmap-ai --enhanced -u "http://example.com/page.php?id=1" --level 3 --risk 2
281
+
282
+ # Test with aggressive settings
283
+ sqlmap-ai --enhanced --aggressive -u "http://example.com/page.php?id=1"
284
+
285
+ # Stealth mode with slower, more evasive testing
286
+ sqlmap-ai --enhanced --stealth -u "http://example.com/page.php?id=1"
241
287
  ```
242
288
 
243
289
  ### AI Provider Selection
@@ -256,19 +302,45 @@ sqlmap-ai -u "http://example.com/page.php?id=1" --ai-provider openai
256
302
  sqlmap-ai -u "http://example.com/page.php?id=1" --ai-provider auto
257
303
  ```
258
304
 
305
+ ### Parameter-Specific Testing
306
+
307
+ Test only specific parameters to save time and focus your testing:
308
+
309
+ ```bash
310
+ # Test only the 'id' parameter
311
+ sqlmap-ai --enhanced -u "http://example.com/page.php?id=1&name=test" -p id
312
+
313
+ # Test multiple specific parameters
314
+ sqlmap-ai --enhanced -u "http://example.com/login?user=admin&pass=123&token=abc" -p user,pass
315
+
316
+ # Test with request file and specific parameter
317
+ sqlmap-ai --enhanced -r request.txt -p username
318
+
319
+ # Adaptive testing on specific parameter
320
+ sqlmap-ai --enhanced --adaptive -r request.txt -p id
321
+ ```
322
+
323
+ **Benefits:**
324
+ - **Faster Testing** - Skip irrelevant parameters
325
+ - **Focused Analysis** - Concentrate on known vulnerable parameters
326
+ - **Cost Efficient** - Reduce AI API calls for large forms
327
+
259
328
  ### Complete Testing Workflow
260
329
 
261
330
  ```bash
262
331
  # 1. Basic scan with URL
263
- sqlmap-ai -u "http://example.com/page.php?id=1"
332
+ sqlmap-ai --enhanced -u "http://example.com/page.php?id=1"
333
+
334
+ # 2. Test specific parameter only
335
+ sqlmap-ai --enhanced -u "http://example.com/page?id=1&name=test" -p id
264
336
 
265
- # 2. Enhanced scan with request file
337
+ # 3. Enhanced scan with request file
266
338
  sqlmap-ai --enhanced --adaptive -r captured_request.txt
267
339
 
268
- # 3. Advanced scan with custom options
340
+ # 4. Advanced scan with custom options
269
341
  sqlmap-ai --enhanced -r request.txt --level 4 --risk 3 --threads 10
270
342
 
271
- # 4. Simple mode for quick testing
343
+ # 5. Simple mode for quick testing
272
344
  sqlmap-ai --simple -r request.txt --batch
273
345
  ```
274
346
 
@@ -292,12 +364,22 @@ sqlmap-ai --enhanced --adaptive -r request.txt --ai-provider groq
292
364
  - AI-powered vulnerability analysis
293
365
  - Adaptive testing strategies
294
366
  - WAF evasion techniques
295
- - Beautiful HTML reports
367
+ - **Beautiful HTML reports** with comprehensive details
296
368
  - Risk assessment and remediation guidance
297
369
  - Interactive CLI with progress tracking
298
370
  - Multiple AI providers (Groq, OpenAI, Anthropic, Ollama)
299
371
  - Advanced configuration management
300
- - Request file support (NEW!)
372
+ - Request file support
373
+ - Parameter-specific testing with `-p` option
374
+
375
+ **Enhanced HTML Reports Include:**
376
+ - [x] **Vulnerability Details** - Complete parameter analysis with injection payloads
377
+ - [x] **Database Information** - All discovered databases with tables and columns
378
+ - [x] **Scan History** - Detailed step-by-step findings with sample payloads
379
+ - [x] **Risk Assessment** - Overall risk level and vulnerability counts
380
+ - [x] **AI Recommendations** - Smart suggestions for remediation
381
+ - [x] **Interactive Charts** - Visual representation of scan results
382
+ - [x] **Export Ready** - Professional format for security reports
301
383
 
302
384
  ### Simple Mode
303
385
  Basic SQL injection testing without AI features:
@@ -334,20 +416,44 @@ sqlmap-ai --enhanced --adaptive -r request.txt --ai-provider groq
334
416
  ```
335
417
 
336
418
  **Adaptive Steps:**
337
- 1. **🟢 Initial Assessment** - Check for SQL injection vulnerabilities
338
- 2. **🟠 DBMS Identification** - Detect database type (MySQL, PostgreSQL, etc.)
339
- 3. **🔴 Enhanced Testing** - Try more aggressive techniques
340
- 4. **🟣 Data Extraction** - Extract valuable data from identified tables
341
- 5. **🤖 AI Analysis** - Get AI recommendations for next steps
419
+ 1. **Initial Assessment** - Quick vulnerability check
420
+ - Tests for SQL injection with basic techniques
421
+ - Identifies vulnerable parameters
422
+ - Discovers initial database information
423
+
424
+ 2. **DBMS Identification** - Detect specific database type
425
+ - Identifies MySQL, PostgreSQL, Oracle, MSSQL, etc.
426
+ - Enables database-specific attack optimization
427
+ - Detects WAF/IPS presence
428
+
429
+ 3. **Enhanced Database Testing** - Deep database enumeration
430
+ - Enumerates all databases and tables
431
+ - Extracts table structures and column names
432
+ - Adapts based on discovered schema
433
+
434
+ 4. **Data Extraction** - Extract sensitive information
435
+ - Dumps data from identified tables
436
+ - Targets high-value tables (users, credentials, etc.)
437
+ - Uses optimized extraction techniques
438
+
439
+ 5. **Enhanced Testing** - Aggressive vulnerability testing
440
+ - Increases risk and level settings
441
+ - Tests for advanced injection types
442
+ - Attempts privilege escalation techniques
443
+
444
+ 6. **Alternative Testing** - Test additional attack vectors
445
+ - POST parameters and request body
446
+ - Cookies and session data
447
+ - HTTP headers (User-Agent, Referer, etc.)
342
448
 
343
449
  ## AI Providers Comparison
344
450
 
345
451
  | Provider | Setup | Speed | Privacy | Cost |
346
452
  |----------|-------|-------|---------|------|
347
- | **Groq** | API Key | Fastest | Cloud | Free tier available |
348
- | **OpenAI** | API Key | Fast | Cloud | Pay per use |
349
- | **Anthropic** | API Key | Fast | Cloud | Pay per use |
350
- | **Ollama** | Local install | Fast | 🔒 Local | Free |
453
+ | **Groq** | API Key | Fastest | Cloud | Free tier available |
454
+ | **OpenAI** | API Key | Fast | Cloud | Pay per use |
455
+ | **Anthropic** | API Key | Fast | Cloud | Pay per use |
456
+ | **Ollama** | Local install | Fast | Local | Free |
351
457
 
352
458
  ## Configuration Files
353
459
 
@@ -406,8 +512,11 @@ ui:
406
512
  - Verify `.env` has `ENABLE_OLLAMA=true`
407
513
 
408
514
  **3. "SQLMap not found"**
409
- - Run `sqlmap-ai --install-check` to install SQLMap
410
- - Or install manually: `pip install sqlmap`
515
+ - Install SQLMap globally using one of these methods:
516
+ - **Kali/Debian/Ubuntu:** `sudo apt install sqlmap`
517
+ - **macOS:** `brew install sqlmap`
518
+ - **From source:** `git clone https://github.com/sqlmapproject/sqlmap.git && cd sqlmap && sudo python setup.py install`
519
+ - Verify installation: `sqlmap --version`
411
520
 
412
521
  **4. "Configuration issues"**
413
522
  - Run `sqlmap-ai --config-wizard` to fix setup
@@ -437,22 +546,88 @@ sqlmap-ai --enhanced --help
437
546
  sqlmap-ai --simple --help
438
547
  ```
439
548
 
549
+ ## Command-Line Options
550
+
551
+ ### Target Specification
552
+ ```bash
553
+ -u, --url URL Target URL (e.g., "http://example.com/page?id=1")
554
+ -r, --request FILE Load HTTP request from file (Burp/ZAP/Browser)
555
+ ```
556
+
557
+ ### Parameter Testing
558
+ ```bash
559
+ -p, --param PARAMS Test specific parameter(s) (comma-separated)
560
+ Examples: -p id | -p id,username,token
561
+ ```
562
+
563
+ ### Scanning Options
564
+ ```bash
565
+ --adaptive Use adaptive step-by-step testing
566
+ --aggressive Aggressive testing (risk=3, level=5)
567
+ --stealth Stealth mode (slower, more evasive)
568
+ --timeout SECONDS Scan timeout in seconds (default: 120)
569
+ --threads NUM Number of threads 1-20 (default: 5)
570
+ --risk LEVEL Risk level 1-3 (default: 1)
571
+ --level LEVEL Test level 1-5 (default: 1)
572
+ ```
573
+
574
+ ### AI Configuration
575
+ ```bash
576
+ --ai-provider PROVIDER AI provider: groq|openai|anthropic|ollama|auto
577
+ --disable-ai Disable AI analysis
578
+ --ollama-model MODEL Specific Ollama model to use
579
+ ```
580
+
581
+ ### WAF Evasion
582
+ ```bash
583
+ --tamper SCRIPTS Tamper scripts (comma-separated)
584
+ --auto-tamper Auto-select tamper scripts based on WAF
585
+ --random-agent Use random User-Agent
586
+ ```
587
+
588
+ ### Output Options
589
+ ```bash
590
+ --output-dir DIR Output directory for reports (default: reports)
591
+ --output-format FORMAT Output format: html|json|text
592
+ --save-json Save results as JSON
593
+ ```
594
+
595
+ ### Configuration
596
+ ```bash
597
+ --config-wizard Run interactive configuration wizard
598
+ --check-providers Check AI provider availability
599
+ --list-ollama-models List available Ollama models
600
+ --install-check Check installation and create config files
601
+ ```
602
+
440
603
  ## Advanced Features
441
604
 
442
605
  ### Adaptive Testing Mode
443
- Automatically adapts testing strategy based on target:
606
+ Automatically adapts testing strategy based on target response and discovered information:
444
607
 
445
608
  ```bash
446
- sqlmap-ai --adaptive
609
+ # Enable adaptive mode
610
+ sqlmap-ai --enhanced --adaptive -u "http://example.com/page.php?id=1"
611
+
612
+ # With request file
613
+ sqlmap-ai --enhanced --adaptive -r request.txt
614
+
615
+ # With specific parameter
616
+ sqlmap-ai --enhanced --adaptive -r request.txt -p id
447
617
  ```
448
618
 
449
- This mode:
450
- 1. **Initial Assessment** - Check for SQL injection vulnerabilities
451
- 2. **DBMS Identification** - Detect database type
452
- 3. **DBMS-Specific Attacks** - Use optimized techniques
453
- 4. **WAF Bypass** - Automatically select tamper scripts
454
- 5. **Data Extraction** - Extract sensitive information
455
- 6. **Alternative Testing** - Test POST, cookies, headers
619
+ **How Adaptive Testing Works:**
620
+
621
+ The adaptive engine intelligently sequences through 6 testing phases, adjusting strategy based on what it discovers:
622
+
623
+ 1. **Initial Assessment** - Quick vulnerability identification
624
+ 2. **DBMS Identification** - Database fingerprinting and WAF detection
625
+ 3. **Enhanced Database Testing** - Complete schema enumeration
626
+ 4. **Data Extraction** - Targeted data dumping from sensitive tables
627
+ 5. **Enhanced Testing** - Aggressive techniques if databases found
628
+ 6. **Alternative Testing** - Additional attack vectors (POST, cookies, headers)
629
+
630
+ Each step builds on previous discoveries, ensuring efficient and thorough testing while minimizing unnecessary requests.
456
631
 
457
632
  ### Ollama Model Selection
458
633
 
@@ -472,87 +647,13 @@ Popular models:
472
647
  - **mistral** - Fast and efficient
473
648
  - **qwen2.5** - Good reasoning capabilities
474
649
 
475
- ### Result:
476
- ```json
477
- {
478
- "timestamp": 1755896586,
479
- "scan_info": {
480
- "vulnerable_parameters": [
481
- "cat"
482
- ],
483
- "techniques": [
484
- "MySQL"
485
- ],
486
- "databases": [],
487
- "tables": [],
488
- "columns": {},
489
- "dbms": "back-end DBMS: MySQL >= 5.6",
490
- "os": "Unknown",
491
- "waf_detected": false,
492
- "web_app": [],
493
- "payloads": [],
494
- "raw_result": "[+] the following parameters are vulnerable to SQL injection:\n Parameter: cat (GET)\n[+] back-end DBMS: back-end DBMS: MySQL >= 5.6\n[+] banner: 8.0.22-0ubuntu0.20.04.2",
495
- "url": "",
496
- "extracted": {}
497
- },
498
- "scan_history": [
499
- {
500
- "step": "initial_reconnaissance",
501
- "command": "sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 --fingerprint --dbs",
502
- "result": {
503
- "vulnerable_parameters": [
504
- "cat"
505
- ],
506
- "techniques": [
507
- "MySQL"
508
- ],
509
- "databases": [
510
- "acuart",
511
- "information_schema"
512
- ],
513
- "tables": [],
514
- "columns": {},
515
- "dbms": "back-end DBMS: MySQL >= 5.6",
516
- "os": "Unknown",
517
- "waf_detected": false,
518
- "web_app": [],
519
- "payloads": [],
520
- "raw_result": "[+] the following parameters are vulnerable to SQL injection:\n Parameter: cat (GET)\n[+] back-end DBMS: back-end DBMS: MySQL >= 5.6\n[+] banner: 8.0.22-0ubuntu0.20.04.2\n[+] available databases [2]:\n[*] acuart\n[*] information_schema",
521
- "url": "",
522
- "extracted": {}
523
- }
524
- },
525
- {
526
- "step": "follow_up_scan",
527
- "command": "sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 ['-D acuart --tables', '-D acuart --columns', '-D acuart -T users --dump']",
528
- "result": {
529
- "vulnerable_parameters": [
530
- "cat"
531
- ],
532
- "techniques": [
533
- "MySQL"
534
- ],
535
- "databases": [],
536
- "tables": [],
537
- "columns": {},
538
- "dbms": "back-end DBMS: MySQL >= 5.6",
539
- "os": "Unknown",
540
- "waf_detected": false,
541
- "web_app": [],
542
- "payloads": [],
543
- "raw_result": "[+] the following parameters are vulnerable to SQL injection:\n Parameter: cat (GET)\n[+] back-end DBMS: back-end DBMS: MySQL >= 5.6\n[+] banner: 8.0.22-0ubuntu0.20.04.2",
544
- "url": "",
545
- "extracted": {}
546
- }
547
- }
548
- ]
549
- }
550
- ```
551
-
552
650
  ## Requirements
553
651
 
554
652
  - Python 3.8+
555
- - SQLMap (installed automatically)
653
+ - SQLMap (must be installed globally on your system)
654
+ - Kali/Debian/Ubuntu: `sudo apt install sqlmap`
655
+ - macOS: `brew install sqlmap`
656
+ - From source: [github.com/sqlmapproject/sqlmap](https://github.com/sqlmapproject/sqlmap)
556
657
  - Internet connection (for cloud AI providers)
557
658
  - 2GB+ RAM (for Ollama local models)
558
659