Archive
SCIENTIFIC RESEARCH-2025 SCIENTIFIC RESEARCH 2024 SCIENTIFIC RESEARCH 2023 SCIENTIFIC RESEARCH 2022 SCIENTIFIC RESEARCH 2021

DOI:  https://doi.org/10.36719/2789-6919/45/176-179

Nurvin Rahimov

Academy of Public Administration under

the President of the Republic of Azerbaijan

Master student

https://orcid.org/0009-0001-8633-9608

ragimovnurvin1@gmail.com

 

Automated Detection of SQLMAP and SQL INJECTION Attacks

 

Abstract

 

This article is dedicated to a comprehensive analysis of the SQLMap tool, which is widely used for the automated detection of SQL injection attacks. SQL injection is a common type of cyberattack in which cybercriminals exploit vulnerabilities in web applications to gain unauthorized access to databases. Such attacks often lead to severe consequences, including the leakage of confidential data, destruction of databases, and disruption of system operations. Ensuring the security of databases requires robust and effective solutions. The paper focuses on the functional capabilities and application  mechanisms  of  SQLMap,  a  popular tool  for the automated detection of SQL injection (SQLi) vulnerabilities. SQL injection attacks are among the most dangerous and widespread security threats targeting web-based databases. By manipulating data queries, attackers gain unauthorized access, alter existing information, delete data, or extract sensitive records. The article notes that these attacks pose a serious threat not only to personal and commercial data but also to government agencies and critical infrastructure systems. Therefore, the timely detection and prevention of SQL injection attacks are considered one of the main priorities in information security. In this context, SQLMap stands out as an indispensable tool for security specialists. It is open-source and offers extensive features for identifying various types of SQL injection vulnerabilities, exploiting them automatically, and analyzing the outcomes. SQLMap enables users to retrieve detailed information about the database structure, user privileges, stored data, and other critical components with just a few command-line inputs.

Keywords: SQL injection, SQLMap, automated detection, database security, vulnerability analysis, attack simulation, web application security


 


Views: 115