44
55<title>sqlmap user's manual
66<author>by <htmlurl url="mailto:
[email protected] " name="Bernardo Damele A. G.">
7- <date>version 0.6.3, DDth of November 2008
7+ <date>version 0.6.3, DDth of December 2008
88<abstract>
99This document is the user's manual to use <htmlurl url="http://sqlmap.sourceforge.net" name="sqlmap">.
1010Check the project <htmlurl url="http://sqlmap.sourceforge.net" name="homepage">
@@ -309,7 +309,7 @@ $ python sqlmap.py -h
309309 sqlmap/0.6.3 coded by Bernardo Damele A. G. <
[email protected] >
310310 and Daniele Bellucci <
[email protected] >
311311
312- Usage: sqlmap.py [options] {-u <URL> | -g <google dork> | -c <config file>}
312+ Usage: sqlmap.py [options] {-u " <URL>" | -g " <google dork>" | -c " <config file>" }
313313
314314Options:
315315 --version show program's version number and exit
@@ -344,8 +344,8 @@ Options:
344344 using the default blind SQL injection technique.
345345
346346 --time-test Test for Time based blind SQL injection
347- --union-test Test for UNION SELECT (inband) SQL injection
348- --union-use Use the UNION SELECT (inband) SQL injection to
347+ --union-test Test for UNION query (inband) SQL injection
348+ --union-use Use the UNION query (inband) SQL injection to
349349 retrieve the queries output. No need to go blind
350350
351351 Fingerprint:
@@ -446,7 +446,7 @@ headers and level 5 show also HTTP responses page content.
446446Example on a <bf>MySQL 5.0.51</bf> target (verbosity level <bf>1</bf>):
447447
448448<tscreen><verb>
449- $ python sqlmap.py -u http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2 -v 1
449+ $ python sqlmap.py -u " http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2" -v 1
450450
451451[hh:mm:01] [INFO] testing connection to the target url
452452[hh:mm:01] [INFO] testing if the url is stable, wait a few seconds
@@ -482,7 +482,7 @@ back-end DBMS: MySQL >= 5.0.0
482482Example on a <bf>MySQL 5.0.51</bf> target (verbosity level <bf>2</bf>):
483483
484484<tscreen><verb>
485- $ python sqlmap.py -u http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2 -v 2
485+ $ python sqlmap.py -u " http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2" -v 2
486486
487487[hh:mm:34] [DEBUG] initializing the configuration
488488[hh:mm:34] [DEBUG] initializing the knowledge base
@@ -503,7 +503,7 @@ $ python sqlmap.py -u http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat
503503Example on a <bf>MySQL 5.0.51</bf> target (verbosity level <bf>3</bf>):
504504
505505<tscreen><verb>
506- $ python sqlmap.py -u http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2 -v 3
506+ $ python sqlmap.py -u " http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2" -v 3
507507
508508[...]
509509[hh:mm:28] [INFO] testing connection to the target url
@@ -528,7 +528,7 @@ Connection: close
528528Example on a <bf>MySQL 5.0.51</bf> target (verbosity level <bf>4</bf>):
529529
530530<tscreen><verb>
531- $ python sqlmap.py -u http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2 -v 4
531+ $ python sqlmap.py -u " http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2" -v 4
532532
533533[...]
534534[hh:mm:32] [INFO] testing connection to the target url
@@ -571,7 +571,7 @@ Content-Type: text/html
571571Example on a <bf>MySQL 5.0.51</bf> target (verbosity level <bf>5</bf>):
572572
573573<tscreen><verb>
574- $ python sqlmap.py -u http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2 -v 5
574+ $ python sqlmap.py -u " http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2" -v 5
575575
576576[...]
577577[hh:mm:23] [INFO] testing connection to the target url
@@ -624,6 +624,15 @@ Content-Type: text/html
624624</verb></tscreen>
625625
626626
627+ <sect2>List of targets
628+
629+ <p>
630+ Option: <tt>-l</tt>
631+
632+ <p>
633+ TODO
634+
635+
627636<sect2>Process Google dork results as target urls
628637
629638<p>
@@ -685,7 +694,7 @@ Example on a <bf>PostgreSQL 8.2.7</bf> target:
685694
686695<tscreen><verb>
687696$ python sqlmap.py -u "http://192.168.1.121/sqlmap/pgsql/get_int.php?id=1&cat=2" -v 1 \
688- -p id
697+ -p "id"
689698
690699[hh:mm:48] [INFO] testing connection to the target url
691700[hh:mm:48] [INFO] testing if the url is stable, wait a few seconds
@@ -718,7 +727,7 @@ Example on a <bf>MySQL 5.0.51</bf> target:
718727
719728<tscreen><verb>
720729$ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int.php?id=1&cat=2" -v 1 \
721- -p user-agent --user-agent "sqlmap/0.6.3 (http://sqlmap.sourceforge.net)"
730+ -p " user-agent" --user-agent "sqlmap/0.6.3 (http://sqlmap.sourceforge.net)"
722731
723732[hh:mm:40] [WARNING] the testable parameter 'user-agent' you provided is not into the GET
724733[hh:mm:40] [INFO] testing connection to the target url
@@ -765,7 +774,7 @@ tested for SQL injection like the <tt>GET</tt> parameters.
765774Example on an <bf>Oracle XE 10.2.0.1</bf> target:
766775
767776<tscreen><verb>
768- $ python sqlmap.py -u http://192.168.1.121/sqlmap/oracle/post_int.php --method POST \
777+ $ python sqlmap.py -u " http://192.168.1.121/sqlmap/oracle/post_int.php" --method POST \
769778 --data "id=1&cat=2"
770779
771780[hh:mm:53] [INFO] testing connection to the target url
@@ -1158,7 +1167,7 @@ Option: <tt>--time-test</tt>
11581167TODO
11591168
11601169
1161- <sect2>Test for UNION SELECT query SQL injection
1170+ <sect2>Test for UNION query SQL injection
11621171
11631172<p>
11641173Option: <tt>--union-test</tt>
@@ -1207,7 +1216,7 @@ affected by an inband SQL injection.
12071216In case this vulnerability is exploitable it is strongly recommended to
12081217use it.
12091218
1210- <sect2>Use the UNION SELECT query SQL injection
1219+ <sect2>Use the UNION query SQL injection
12111220
12121221<p>
12131222Option: <tt>--union-use</tt>
0 commit comments