DOI: https://doi.org/10.36719/2789-6919/45/176-179
Nurvin Rahimov
Academy of Public Administration under
the President of the Republic of Azerbaijan
Master student
https://orcid.org/0009-0001-8633-9608
ragimovnurvin1@gmail.com
Automated Detection of SQLMAP and SQL INJECTION Attacks
Abstract
This article is dedicated to a comprehensive analysis of the SQLMap tool, which is widely used for the automated detection of SQL injection attacks. SQL injection is a common type of cyberattack in which cybercriminals exploit vulnerabilities in web applications to gain unauthorized access to databases. Such attacks often lead to severe consequences, including the leakage of confidential data, destruction of databases, and disruption of system operations. Ensuring the security of databases requires robust and effective solutions. The paper focuses on the functional capabilities and application mechanisms of SQLMap, a popular tool for the automated detection of SQL injection (SQLi) vulnerabilities. SQL injection attacks are among the most dangerous and widespread security threats targeting web-based databases. By manipulating data queries, attackers gain unauthorized access, alter existing information, delete data, or extract sensitive records. The article notes that these attacks pose a serious threat not only to personal and commercial data but also to government agencies and critical infrastructure systems. Therefore, the timely detection and prevention of SQL injection attacks are considered one of the main priorities in information security. In this context, SQLMap stands out as an indispensable tool for security specialists. It is open-source and offers extensive features for identifying various types of SQL injection vulnerabilities, exploiting them automatically, and analyzing the outcomes. SQLMap enables users to retrieve detailed information about the database structure, user privileges, stored data, and other critical components with just a few command-line inputs.
Keywords: SQL injection, SQLMap, automated detection, database security, vulnerability analysis, attack simulation, web application security