<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://techdoku.nogafam.es/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://techdoku.nogafam.es/feed.php">
        <title>NoBIGTech Wiki Técnico - docu:csheet:ofsec:hack:sql</title>
        <description></description>
        <link>https://techdoku.nogafam.es/</link>
        <image rdf:resource="https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-05-12T12:44:49+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:sql:sqlserver&amp;rev=1581196617&amp;do=diff"/>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:sql:testing&amp;rev=1581195907&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>NoBIGTech Wiki Técnico</title>
        <link>https://techdoku.nogafam.es/</link>
        <url>https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:sql:sqlserver&amp;rev=1581196617&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-02-08T21:16:57+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>sqlserver</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:sql:sqlserver&amp;rev=1581196617&amp;do=diff</link>
        <description>Gathering information about an SQL Server database



Gather SQL Server data and valuable information once a sql-shell is obtained



-- Add `FOR XML PATH(&#039;&#039;)` at the end of every query to get everything as 1 xml string.
-- You can also use `FIELD + &#039;, &#039; AS &#039;data()&#039;` to get fields as string.</description>
    </item>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:sql:testing&amp;rev=1581195907&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-02-08T21:05:07+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>testing</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:hack:sql:testing&amp;rev=1581195907&amp;do=diff</link>
        <description>SQL Injection testing and exploiting with sqlmap



Get, test, and exploit SQL injection vulnerabilities on a website.

Using a OpenVPN tunnel and then tor is pretty recommended,
although the timing-based attacks will mostly fail.


# -u URL         | the base url to use (with the http GET payload)
# --dbs          | fetch all databases once a viable technique found.
# --tables       | combined with -D DATABASE, fetch all tables from that database
# --dump         | dump the selected data (into …</description>
    </item>
</rdf:RDF>
