Using SQLMAP for Exploiting SQL Injections in URL Rewrite Rules do son Using SQLMAP for Exploiting SQL Injections in URL Rewrite Rules2017-01-12T09:39:39+00:00 InfoSec Forums › InfoSec Forums › Web Application Penetration Testing › SQL Injection › Using SQLMAP for Exploiting SQL Injections in URL Rewrite Rules This topic contains 1 reply, has 2 voices, and was last updated by cpw0912 1 week ago. Author Posts January 12, 2017 at 9:38 am #4791 do sonModerator Topics:200Comments:49Super Member★★★★ Last week, on my facebook fange, i received a question about how to testing sql injection with url like “http://target.com/search/test/product/1” . It is interesting question. Normally, when you use sqlmap for testing webapp, it have type of formatting as blow: http://www.target.com/?q=1 But, nowaday, many website don’t use this format. They usually use: http://www.target.com/search/product/1 If you use manual testing, http://www.target.com/search/product/1‘, you can get sql error. To automatic testing with sqlmap, you can use command sqlmap.py –url http://www.target.com/search/product/1* you need to add * character to tell to sqlmap that * is where can inject. You should use sqlmap tamper to bypass WAF. Please visit here for more tamper info. DEMO No system is truly secure! January 14, 2017 at 7:25 am #4828 cpw0912Participant Topics:0Comments:3Newbie★ Your website teach & share a lot of knowledge for us~~ Thank you~~ Author Posts You must be logged in to reply to this topic.