How does the –os-shell parameter in Sqlmap work? Is it still anonymous over Tor?

How does the –os-shell parameter in Sqlmap work? I know its uploading a backdoor, but how is Sqlmap uploading it and is the file just a normal reverse shell trojan?
Also, is it still anonymous when being used over the –tor switch?

Continue reading How does the –os-shell parameter in Sqlmap work? Is it still anonymous over Tor?

What is the wisdom of using the ASCII function in exploit SQLi?

I mean, I can exploit the vulnerability using a substring function and without using an ASCII function like:
SELECT username FROM users WHERE id = 1 AND (SELECT substring(password,1,1) FROM users WHERE username = ‘admin’ ) = ‘a’;
And I ca… Continue reading What is the wisdom of using the ASCII function in exploit SQLi?