Dark Side 117: Using Sqlmap for Database Takeover

An overview of using Sqlmap to exploit SQL injection vulnerabilities.

image from canva.com

When it comes to exploiting vulnerabilities nowadays, it’s more about knowing how to use pen testing tools than needing to know how to create your own exploit.

While you need to have a basic understanding of technology, networks, and…



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Katlyn Gallo

Katlyn Gallo


Coffee lover, bookworm, and InfoSec enthusiast | Find me on Twitter & Instagram: @ktgblogstech