sqlmap-ai 2.0.2__tar.gz → 2.0.7__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/LICENSE +21 -21
- {sqlmap_ai-2.0.2/sqlmap_ai.egg-info → sqlmap_ai-2.0.7}/PKG-INFO +219 -118
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/README.md +601 -501
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/pyproject.toml +154 -153
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/setup.py +288 -292
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/__init__.py +25 -29
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/adaptive_testing.py +803 -778
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/advanced_reporting.py +741 -746
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/ai_analyzer.py +330 -216
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/cli.py +216 -215
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/config_manager.py +511 -436
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/enhanced_cli.py +837 -770
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/evasion_engine.py +479 -483
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/html_reporter.py +770 -822
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/main.py +740 -559
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/parser.py +236 -232
- sqlmap_ai-2.0.7/sqlmap_ai/run.py +364 -0
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/runner.py +809 -755
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/security_manager.py +553 -544
- sqlmap_ai-2.0.7/sqlmap_ai/startup.py +234 -0
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/timeout_handler.py +40 -40
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/ui.py +106 -114
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7/sqlmap_ai.egg-info}/PKG-INFO +219 -118
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai.egg-info/SOURCES.txt +2 -0
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai.egg-info/requires.txt +1 -0
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/tests/test_config_manager.py +122 -125
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/tests/test_security_manager.py +147 -150
- sqlmap_ai-2.0.7/utils/__init__.py +3 -0
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/utils/ai_providers.py +517 -509
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/utils/groq_utils.py +61 -75
- sqlmap_ai-2.0.2/utils/__init__.py +0 -6
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/setup.cfg +0 -0
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai/templates/report_template.html +0 -0
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai.egg-info/dependency_links.txt +0 -0
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai.egg-info/entry_points.txt +0 -0
- {sqlmap_ai-2.0.2 → sqlmap_ai-2.0.7}/sqlmap_ai.egg-info/top_level.txt +0 -0
|
@@ -1,21 +1,21 @@
|
|
|
1
|
-
MIT License
|
|
2
|
-
|
|
3
|
-
Copyright (c) 2024
|
|
4
|
-
|
|
5
|
-
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
6
|
-
of this software and associated documentation files (the "Software"), to deal
|
|
7
|
-
in the Software without restriction, including without limitation the rights
|
|
8
|
-
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
9
|
-
copies of the Software, and to permit persons to whom the Software is
|
|
10
|
-
furnished to do so, subject to the following conditions:
|
|
11
|
-
|
|
12
|
-
The above copyright notice and this permission notice shall be included in all
|
|
13
|
-
copies or substantial portions of the Software.
|
|
14
|
-
|
|
15
|
-
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
16
|
-
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
17
|
-
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
18
|
-
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
19
|
-
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
20
|
-
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
21
|
-
SOFTWARE.
|
|
1
|
+
MIT License
|
|
2
|
+
|
|
3
|
+
Copyright (c) 2024
|
|
4
|
+
|
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
6
|
+
of this software and associated documentation files (the "Software"), to deal
|
|
7
|
+
in the Software without restriction, including without limitation the rights
|
|
8
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
9
|
+
copies of the Software, and to permit persons to whom the Software is
|
|
10
|
+
furnished to do so, subject to the following conditions:
|
|
11
|
+
|
|
12
|
+
The above copyright notice and this permission notice shall be included in all
|
|
13
|
+
copies or substantial portions of the Software.
|
|
14
|
+
|
|
15
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
16
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
17
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
18
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
19
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
20
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
21
|
+
SOFTWARE.
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: sqlmap-ai
|
|
3
|
-
Version: 2.0.
|
|
3
|
+
Version: 2.0.7
|
|
4
4
|
Summary: AI-powered SQL injection testing tool with multiple AI providers
|
|
5
5
|
Home-page: https://github.com/atiilla/sqlmap-ai
|
|
6
6
|
Author: Atilla
|
|
@@ -38,6 +38,7 @@ Requires-Dist: pyyaml>=6.0.1
|
|
|
38
38
|
Requires-Dist: rich>=13.0.0
|
|
39
39
|
Requires-Dist: jinja2>=3.1.2
|
|
40
40
|
Requires-Dist: cryptography>=3.4.0
|
|
41
|
+
Requires-Dist: colorama>=0.4.6
|
|
41
42
|
Provides-Extra: dev
|
|
42
43
|
Requires-Dist: pytest>=7.0.0; extra == "dev"
|
|
43
44
|
Requires-Dist: pytest-asyncio>=0.21.0; extra == "dev"
|
|
@@ -71,17 +72,52 @@ An AI-powered wrapper around SQLMap that makes SQL injection testing more access
|
|
|
71
72
|
|
|
72
73
|
## Features
|
|
73
74
|
|
|
74
|
-
|
|
75
|
-
-
|
|
76
|
-
-
|
|
77
|
-
- **
|
|
78
|
-
- **
|
|
75
|
+
### Core Features
|
|
76
|
+
- **AI-Assisted Testing** - Intelligent vulnerability analysis and recommendations
|
|
77
|
+
- **Adaptive Testing** - Step-by-step testing that adapts to target responses
|
|
78
|
+
- **Enhanced HTML Reports** - Beautiful, detailed reports with vulnerability details
|
|
79
|
+
- **Parameter Targeting** - Test specific parameters with `-p` option (like original SQLMap)
|
|
80
|
+
- **WAF Bypass** - Automatic tamper script selection for firewall evasion
|
|
81
|
+
- **Database Enumeration** - Complete database, table, and column discovery
|
|
82
|
+
- **Request File Support** - Test from Burp Suite, ZAP, or browser captures
|
|
83
|
+
|
|
84
|
+
### AI Providers
|
|
85
|
+
- **Groq** - Fastest AI analysis (recommended)
|
|
86
|
+
- **OpenAI** - GPT-4 powered analysis
|
|
87
|
+
- **Anthropic Claude** - Advanced reasoning
|
|
88
|
+
- **Ollama** - Local, private AI (no cloud required)
|
|
89
|
+
|
|
90
|
+
### New in v2.0.5
|
|
91
|
+
- [x] **Parameter Selection** - Target specific parameters with `-p id,username`
|
|
92
|
+
- [x] **Enhanced Reports** - Detailed HTML reports with tables, columns, and payloads
|
|
93
|
+
- [x] **Global SQLMap** - Uses your system's SQLMap installation
|
|
94
|
+
- [x] **Bug Fixes** - Improved database tracking and report generation
|
|
79
95
|
|
|
80
96
|
<img src="sqlmap.gif"/>
|
|
81
97
|
|
|
82
98
|
## Quick Start
|
|
83
99
|
|
|
84
|
-
### Step 1: Install SQLMap
|
|
100
|
+
### Step 1: Install SQLMap (Prerequisite)
|
|
101
|
+
|
|
102
|
+
First, install SQLMap globally on your system:
|
|
103
|
+
|
|
104
|
+
```bash
|
|
105
|
+
# Kali/Debian/Ubuntu
|
|
106
|
+
sudo apt install sqlmap
|
|
107
|
+
|
|
108
|
+
# macOS
|
|
109
|
+
brew install sqlmap
|
|
110
|
+
|
|
111
|
+
# Or from source
|
|
112
|
+
git clone https://github.com/sqlmapproject/sqlmap.git
|
|
113
|
+
cd sqlmap
|
|
114
|
+
sudo python setup.py install
|
|
115
|
+
|
|
116
|
+
# Verify installation
|
|
117
|
+
sqlmap --version
|
|
118
|
+
```
|
|
119
|
+
|
|
120
|
+
### Step 2: Install SQLMap AI
|
|
85
121
|
|
|
86
122
|
```bash
|
|
87
123
|
# Clone the repository
|
|
@@ -91,13 +127,14 @@ cd sqlmap-ai
|
|
|
91
127
|
# Install the package
|
|
92
128
|
pip install -e .
|
|
93
129
|
|
|
94
|
-
#
|
|
95
|
-
sqlmap-ai --install-check
|
|
96
|
-
|
|
130
|
+
# Or install from PyPI
|
|
97
131
|
pip install sqlmap-ai
|
|
132
|
+
|
|
133
|
+
# Run installation check (creates config files)
|
|
134
|
+
sqlmap-ai --install-check
|
|
98
135
|
```
|
|
99
136
|
|
|
100
|
-
### Step
|
|
137
|
+
### Step 3: Configure AI Providers
|
|
101
138
|
|
|
102
139
|
Choose one or more AI providers to use:
|
|
103
140
|
|
|
@@ -138,7 +175,7 @@ ENABLE_OLLAMA=true
|
|
|
138
175
|
OLLAMA_MODEL=llama3.2
|
|
139
176
|
```
|
|
140
177
|
|
|
141
|
-
### Step
|
|
178
|
+
### Step 4: Run Configuration Wizard
|
|
142
179
|
|
|
143
180
|
```bash
|
|
144
181
|
# Interactive setup
|
|
@@ -151,7 +188,7 @@ This will:
|
|
|
151
188
|
- Configure security settings
|
|
152
189
|
- Set up SQLMap options
|
|
153
190
|
|
|
154
|
-
### Step
|
|
191
|
+
### Step 5: Test Your Setup
|
|
155
192
|
|
|
156
193
|
```bash
|
|
157
194
|
# Check if everything is working
|
|
@@ -231,13 +268,22 @@ username=admin&password=test
|
|
|
231
268
|
|
|
232
269
|
```bash
|
|
233
270
|
# Adaptive testing (recommended)
|
|
234
|
-
sqlmap-ai --adaptive
|
|
271
|
+
sqlmap-ai --enhanced --adaptive -u "http://example.com/page.php?id=1"
|
|
272
|
+
|
|
273
|
+
# Test specific parameter only
|
|
274
|
+
sqlmap-ai --enhanced -u "http://example.com/page.php?id=1&name=test" -p id
|
|
235
275
|
|
|
236
276
|
# Simple mode (basic SQLMap without AI)
|
|
237
277
|
sqlmap-ai --simple -u "http://example.com/page.php?id=1"
|
|
238
278
|
|
|
239
279
|
# Enhanced mode with custom options
|
|
240
280
|
sqlmap-ai --enhanced -u "http://example.com/page.php?id=1" --level 3 --risk 2
|
|
281
|
+
|
|
282
|
+
# Test with aggressive settings
|
|
283
|
+
sqlmap-ai --enhanced --aggressive -u "http://example.com/page.php?id=1"
|
|
284
|
+
|
|
285
|
+
# Stealth mode with slower, more evasive testing
|
|
286
|
+
sqlmap-ai --enhanced --stealth -u "http://example.com/page.php?id=1"
|
|
241
287
|
```
|
|
242
288
|
|
|
243
289
|
### AI Provider Selection
|
|
@@ -256,19 +302,45 @@ sqlmap-ai -u "http://example.com/page.php?id=1" --ai-provider openai
|
|
|
256
302
|
sqlmap-ai -u "http://example.com/page.php?id=1" --ai-provider auto
|
|
257
303
|
```
|
|
258
304
|
|
|
305
|
+
### Parameter-Specific Testing
|
|
306
|
+
|
|
307
|
+
Test only specific parameters to save time and focus your testing:
|
|
308
|
+
|
|
309
|
+
```bash
|
|
310
|
+
# Test only the 'id' parameter
|
|
311
|
+
sqlmap-ai --enhanced -u "http://example.com/page.php?id=1&name=test" -p id
|
|
312
|
+
|
|
313
|
+
# Test multiple specific parameters
|
|
314
|
+
sqlmap-ai --enhanced -u "http://example.com/login?user=admin&pass=123&token=abc" -p user,pass
|
|
315
|
+
|
|
316
|
+
# Test with request file and specific parameter
|
|
317
|
+
sqlmap-ai --enhanced -r request.txt -p username
|
|
318
|
+
|
|
319
|
+
# Adaptive testing on specific parameter
|
|
320
|
+
sqlmap-ai --enhanced --adaptive -r request.txt -p id
|
|
321
|
+
```
|
|
322
|
+
|
|
323
|
+
**Benefits:**
|
|
324
|
+
- **Faster Testing** - Skip irrelevant parameters
|
|
325
|
+
- **Focused Analysis** - Concentrate on known vulnerable parameters
|
|
326
|
+
- **Cost Efficient** - Reduce AI API calls for large forms
|
|
327
|
+
|
|
259
328
|
### Complete Testing Workflow
|
|
260
329
|
|
|
261
330
|
```bash
|
|
262
331
|
# 1. Basic scan with URL
|
|
263
|
-
sqlmap-ai -u "http://example.com/page.php?id=1"
|
|
332
|
+
sqlmap-ai --enhanced -u "http://example.com/page.php?id=1"
|
|
333
|
+
|
|
334
|
+
# 2. Test specific parameter only
|
|
335
|
+
sqlmap-ai --enhanced -u "http://example.com/page?id=1&name=test" -p id
|
|
264
336
|
|
|
265
|
-
#
|
|
337
|
+
# 3. Enhanced scan with request file
|
|
266
338
|
sqlmap-ai --enhanced --adaptive -r captured_request.txt
|
|
267
339
|
|
|
268
|
-
#
|
|
340
|
+
# 4. Advanced scan with custom options
|
|
269
341
|
sqlmap-ai --enhanced -r request.txt --level 4 --risk 3 --threads 10
|
|
270
342
|
|
|
271
|
-
#
|
|
343
|
+
# 5. Simple mode for quick testing
|
|
272
344
|
sqlmap-ai --simple -r request.txt --batch
|
|
273
345
|
```
|
|
274
346
|
|
|
@@ -292,12 +364,22 @@ sqlmap-ai --enhanced --adaptive -r request.txt --ai-provider groq
|
|
|
292
364
|
- AI-powered vulnerability analysis
|
|
293
365
|
- Adaptive testing strategies
|
|
294
366
|
- WAF evasion techniques
|
|
295
|
-
- Beautiful HTML reports
|
|
367
|
+
- **Beautiful HTML reports** with comprehensive details
|
|
296
368
|
- Risk assessment and remediation guidance
|
|
297
369
|
- Interactive CLI with progress tracking
|
|
298
370
|
- Multiple AI providers (Groq, OpenAI, Anthropic, Ollama)
|
|
299
371
|
- Advanced configuration management
|
|
300
|
-
- Request file support
|
|
372
|
+
- Request file support
|
|
373
|
+
- Parameter-specific testing with `-p` option
|
|
374
|
+
|
|
375
|
+
**Enhanced HTML Reports Include:**
|
|
376
|
+
- [x] **Vulnerability Details** - Complete parameter analysis with injection payloads
|
|
377
|
+
- [x] **Database Information** - All discovered databases with tables and columns
|
|
378
|
+
- [x] **Scan History** - Detailed step-by-step findings with sample payloads
|
|
379
|
+
- [x] **Risk Assessment** - Overall risk level and vulnerability counts
|
|
380
|
+
- [x] **AI Recommendations** - Smart suggestions for remediation
|
|
381
|
+
- [x] **Interactive Charts** - Visual representation of scan results
|
|
382
|
+
- [x] **Export Ready** - Professional format for security reports
|
|
301
383
|
|
|
302
384
|
### Simple Mode
|
|
303
385
|
Basic SQL injection testing without AI features:
|
|
@@ -334,20 +416,44 @@ sqlmap-ai --enhanced --adaptive -r request.txt --ai-provider groq
|
|
|
334
416
|
```
|
|
335
417
|
|
|
336
418
|
**Adaptive Steps:**
|
|
337
|
-
1.
|
|
338
|
-
|
|
339
|
-
|
|
340
|
-
|
|
341
|
-
|
|
419
|
+
1. **Initial Assessment** - Quick vulnerability check
|
|
420
|
+
- Tests for SQL injection with basic techniques
|
|
421
|
+
- Identifies vulnerable parameters
|
|
422
|
+
- Discovers initial database information
|
|
423
|
+
|
|
424
|
+
2. **DBMS Identification** - Detect specific database type
|
|
425
|
+
- Identifies MySQL, PostgreSQL, Oracle, MSSQL, etc.
|
|
426
|
+
- Enables database-specific attack optimization
|
|
427
|
+
- Detects WAF/IPS presence
|
|
428
|
+
|
|
429
|
+
3. **Enhanced Database Testing** - Deep database enumeration
|
|
430
|
+
- Enumerates all databases and tables
|
|
431
|
+
- Extracts table structures and column names
|
|
432
|
+
- Adapts based on discovered schema
|
|
433
|
+
|
|
434
|
+
4. **Data Extraction** - Extract sensitive information
|
|
435
|
+
- Dumps data from identified tables
|
|
436
|
+
- Targets high-value tables (users, credentials, etc.)
|
|
437
|
+
- Uses optimized extraction techniques
|
|
438
|
+
|
|
439
|
+
5. **Enhanced Testing** - Aggressive vulnerability testing
|
|
440
|
+
- Increases risk and level settings
|
|
441
|
+
- Tests for advanced injection types
|
|
442
|
+
- Attempts privilege escalation techniques
|
|
443
|
+
|
|
444
|
+
6. **Alternative Testing** - Test additional attack vectors
|
|
445
|
+
- POST parameters and request body
|
|
446
|
+
- Cookies and session data
|
|
447
|
+
- HTTP headers (User-Agent, Referer, etc.)
|
|
342
448
|
|
|
343
449
|
## AI Providers Comparison
|
|
344
450
|
|
|
345
451
|
| Provider | Setup | Speed | Privacy | Cost |
|
|
346
452
|
|----------|-------|-------|---------|------|
|
|
347
|
-
| **Groq** | API Key |
|
|
348
|
-
| **OpenAI** | API Key |
|
|
349
|
-
| **Anthropic** | API Key |
|
|
350
|
-
| **Ollama** | Local install | Fast |
|
|
453
|
+
| **Groq** | API Key | Fastest | Cloud | Free tier available |
|
|
454
|
+
| **OpenAI** | API Key | Fast | Cloud | Pay per use |
|
|
455
|
+
| **Anthropic** | API Key | Fast | Cloud | Pay per use |
|
|
456
|
+
| **Ollama** | Local install | Fast | Local | Free |
|
|
351
457
|
|
|
352
458
|
## Configuration Files
|
|
353
459
|
|
|
@@ -406,8 +512,11 @@ ui:
|
|
|
406
512
|
- Verify `.env` has `ENABLE_OLLAMA=true`
|
|
407
513
|
|
|
408
514
|
**3. "SQLMap not found"**
|
|
409
|
-
-
|
|
410
|
-
-
|
|
515
|
+
- Install SQLMap globally using one of these methods:
|
|
516
|
+
- **Kali/Debian/Ubuntu:** `sudo apt install sqlmap`
|
|
517
|
+
- **macOS:** `brew install sqlmap`
|
|
518
|
+
- **From source:** `git clone https://github.com/sqlmapproject/sqlmap.git && cd sqlmap && sudo python setup.py install`
|
|
519
|
+
- Verify installation: `sqlmap --version`
|
|
411
520
|
|
|
412
521
|
**4. "Configuration issues"**
|
|
413
522
|
- Run `sqlmap-ai --config-wizard` to fix setup
|
|
@@ -437,22 +546,88 @@ sqlmap-ai --enhanced --help
|
|
|
437
546
|
sqlmap-ai --simple --help
|
|
438
547
|
```
|
|
439
548
|
|
|
549
|
+
## Command-Line Options
|
|
550
|
+
|
|
551
|
+
### Target Specification
|
|
552
|
+
```bash
|
|
553
|
+
-u, --url URL Target URL (e.g., "http://example.com/page?id=1")
|
|
554
|
+
-r, --request FILE Load HTTP request from file (Burp/ZAP/Browser)
|
|
555
|
+
```
|
|
556
|
+
|
|
557
|
+
### Parameter Testing
|
|
558
|
+
```bash
|
|
559
|
+
-p, --param PARAMS Test specific parameter(s) (comma-separated)
|
|
560
|
+
Examples: -p id | -p id,username,token
|
|
561
|
+
```
|
|
562
|
+
|
|
563
|
+
### Scanning Options
|
|
564
|
+
```bash
|
|
565
|
+
--adaptive Use adaptive step-by-step testing
|
|
566
|
+
--aggressive Aggressive testing (risk=3, level=5)
|
|
567
|
+
--stealth Stealth mode (slower, more evasive)
|
|
568
|
+
--timeout SECONDS Scan timeout in seconds (default: 120)
|
|
569
|
+
--threads NUM Number of threads 1-20 (default: 5)
|
|
570
|
+
--risk LEVEL Risk level 1-3 (default: 1)
|
|
571
|
+
--level LEVEL Test level 1-5 (default: 1)
|
|
572
|
+
```
|
|
573
|
+
|
|
574
|
+
### AI Configuration
|
|
575
|
+
```bash
|
|
576
|
+
--ai-provider PROVIDER AI provider: groq|openai|anthropic|ollama|auto
|
|
577
|
+
--disable-ai Disable AI analysis
|
|
578
|
+
--ollama-model MODEL Specific Ollama model to use
|
|
579
|
+
```
|
|
580
|
+
|
|
581
|
+
### WAF Evasion
|
|
582
|
+
```bash
|
|
583
|
+
--tamper SCRIPTS Tamper scripts (comma-separated)
|
|
584
|
+
--auto-tamper Auto-select tamper scripts based on WAF
|
|
585
|
+
--random-agent Use random User-Agent
|
|
586
|
+
```
|
|
587
|
+
|
|
588
|
+
### Output Options
|
|
589
|
+
```bash
|
|
590
|
+
--output-dir DIR Output directory for reports (default: reports)
|
|
591
|
+
--output-format FORMAT Output format: html|json|text
|
|
592
|
+
--save-json Save results as JSON
|
|
593
|
+
```
|
|
594
|
+
|
|
595
|
+
### Configuration
|
|
596
|
+
```bash
|
|
597
|
+
--config-wizard Run interactive configuration wizard
|
|
598
|
+
--check-providers Check AI provider availability
|
|
599
|
+
--list-ollama-models List available Ollama models
|
|
600
|
+
--install-check Check installation and create config files
|
|
601
|
+
```
|
|
602
|
+
|
|
440
603
|
## Advanced Features
|
|
441
604
|
|
|
442
605
|
### Adaptive Testing Mode
|
|
443
|
-
Automatically adapts testing strategy based on target:
|
|
606
|
+
Automatically adapts testing strategy based on target response and discovered information:
|
|
444
607
|
|
|
445
608
|
```bash
|
|
446
|
-
|
|
609
|
+
# Enable adaptive mode
|
|
610
|
+
sqlmap-ai --enhanced --adaptive -u "http://example.com/page.php?id=1"
|
|
611
|
+
|
|
612
|
+
# With request file
|
|
613
|
+
sqlmap-ai --enhanced --adaptive -r request.txt
|
|
614
|
+
|
|
615
|
+
# With specific parameter
|
|
616
|
+
sqlmap-ai --enhanced --adaptive -r request.txt -p id
|
|
447
617
|
```
|
|
448
618
|
|
|
449
|
-
|
|
450
|
-
|
|
451
|
-
|
|
452
|
-
|
|
453
|
-
|
|
454
|
-
|
|
455
|
-
|
|
619
|
+
**How Adaptive Testing Works:**
|
|
620
|
+
|
|
621
|
+
The adaptive engine intelligently sequences through 6 testing phases, adjusting strategy based on what it discovers:
|
|
622
|
+
|
|
623
|
+
1. **Initial Assessment** - Quick vulnerability identification
|
|
624
|
+
2. **DBMS Identification** - Database fingerprinting and WAF detection
|
|
625
|
+
3. **Enhanced Database Testing** - Complete schema enumeration
|
|
626
|
+
4. **Data Extraction** - Targeted data dumping from sensitive tables
|
|
627
|
+
5. **Enhanced Testing** - Aggressive techniques if databases found
|
|
628
|
+
6. **Alternative Testing** - Additional attack vectors (POST, cookies, headers)
|
|
629
|
+
|
|
630
|
+
Each step builds on previous discoveries, ensuring efficient and thorough testing while minimizing unnecessary requests.
|
|
456
631
|
|
|
457
632
|
### Ollama Model Selection
|
|
458
633
|
|
|
@@ -472,87 +647,13 @@ Popular models:
|
|
|
472
647
|
- **mistral** - Fast and efficient
|
|
473
648
|
- **qwen2.5** - Good reasoning capabilities
|
|
474
649
|
|
|
475
|
-
### Result:
|
|
476
|
-
```json
|
|
477
|
-
{
|
|
478
|
-
"timestamp": 1755896586,
|
|
479
|
-
"scan_info": {
|
|
480
|
-
"vulnerable_parameters": [
|
|
481
|
-
"cat"
|
|
482
|
-
],
|
|
483
|
-
"techniques": [
|
|
484
|
-
"MySQL"
|
|
485
|
-
],
|
|
486
|
-
"databases": [],
|
|
487
|
-
"tables": [],
|
|
488
|
-
"columns": {},
|
|
489
|
-
"dbms": "back-end DBMS: MySQL >= 5.6",
|
|
490
|
-
"os": "Unknown",
|
|
491
|
-
"waf_detected": false,
|
|
492
|
-
"web_app": [],
|
|
493
|
-
"payloads": [],
|
|
494
|
-
"raw_result": "[+] the following parameters are vulnerable to SQL injection:\n Parameter: cat (GET)\n[+] back-end DBMS: back-end DBMS: MySQL >= 5.6\n[+] banner: 8.0.22-0ubuntu0.20.04.2",
|
|
495
|
-
"url": "",
|
|
496
|
-
"extracted": {}
|
|
497
|
-
},
|
|
498
|
-
"scan_history": [
|
|
499
|
-
{
|
|
500
|
-
"step": "initial_reconnaissance",
|
|
501
|
-
"command": "sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 --fingerprint --dbs",
|
|
502
|
-
"result": {
|
|
503
|
-
"vulnerable_parameters": [
|
|
504
|
-
"cat"
|
|
505
|
-
],
|
|
506
|
-
"techniques": [
|
|
507
|
-
"MySQL"
|
|
508
|
-
],
|
|
509
|
-
"databases": [
|
|
510
|
-
"acuart",
|
|
511
|
-
"information_schema"
|
|
512
|
-
],
|
|
513
|
-
"tables": [],
|
|
514
|
-
"columns": {},
|
|
515
|
-
"dbms": "back-end DBMS: MySQL >= 5.6",
|
|
516
|
-
"os": "Unknown",
|
|
517
|
-
"waf_detected": false,
|
|
518
|
-
"web_app": [],
|
|
519
|
-
"payloads": [],
|
|
520
|
-
"raw_result": "[+] the following parameters are vulnerable to SQL injection:\n Parameter: cat (GET)\n[+] back-end DBMS: back-end DBMS: MySQL >= 5.6\n[+] banner: 8.0.22-0ubuntu0.20.04.2\n[+] available databases [2]:\n[*] acuart\n[*] information_schema",
|
|
521
|
-
"url": "",
|
|
522
|
-
"extracted": {}
|
|
523
|
-
}
|
|
524
|
-
},
|
|
525
|
-
{
|
|
526
|
-
"step": "follow_up_scan",
|
|
527
|
-
"command": "sqlmap -u http://testphp.vulnweb.com/listproducts.php?cat=1 ['-D acuart --tables', '-D acuart --columns', '-D acuart -T users --dump']",
|
|
528
|
-
"result": {
|
|
529
|
-
"vulnerable_parameters": [
|
|
530
|
-
"cat"
|
|
531
|
-
],
|
|
532
|
-
"techniques": [
|
|
533
|
-
"MySQL"
|
|
534
|
-
],
|
|
535
|
-
"databases": [],
|
|
536
|
-
"tables": [],
|
|
537
|
-
"columns": {},
|
|
538
|
-
"dbms": "back-end DBMS: MySQL >= 5.6",
|
|
539
|
-
"os": "Unknown",
|
|
540
|
-
"waf_detected": false,
|
|
541
|
-
"web_app": [],
|
|
542
|
-
"payloads": [],
|
|
543
|
-
"raw_result": "[+] the following parameters are vulnerable to SQL injection:\n Parameter: cat (GET)\n[+] back-end DBMS: back-end DBMS: MySQL >= 5.6\n[+] banner: 8.0.22-0ubuntu0.20.04.2",
|
|
544
|
-
"url": "",
|
|
545
|
-
"extracted": {}
|
|
546
|
-
}
|
|
547
|
-
}
|
|
548
|
-
]
|
|
549
|
-
}
|
|
550
|
-
```
|
|
551
|
-
|
|
552
650
|
## Requirements
|
|
553
651
|
|
|
554
652
|
- Python 3.8+
|
|
555
|
-
- SQLMap (installed
|
|
653
|
+
- SQLMap (must be installed globally on your system)
|
|
654
|
+
- Kali/Debian/Ubuntu: `sudo apt install sqlmap`
|
|
655
|
+
- macOS: `brew install sqlmap`
|
|
656
|
+
- From source: [github.com/sqlmapproject/sqlmap](https://github.com/sqlmapproject/sqlmap)
|
|
556
657
|
- Internet connection (for cloud AI providers)
|
|
557
658
|
- 2GB+ RAM (for Ollama local models)
|
|
558
659
|
|