@@ -236,6 +236,11 @@ <H2><A NAME="s2">2.</A> <A HREF="#toc2">Features</A></H2>
236236Besides these four database management systems software. sqlmap can also
237237identify Microsoft Access, DB2, Informix, Sybase and Interbase.
238238</ LI >
239+ < LI > Full support for three SQL injection techniques: < B > inferential
240+ blind SQL injection</ B > , < B > UNION query (inband) SQL injection</ B > and
241+ < B > stacked queries (multiple statements) support</ B > . sqlmap can also
242+ test for < B > time based blind SQL injection</ B > .
243+ </ LI >
239244< LI > < B > Extensive back-end database management system fingerprint</ B >
240245based upon
241246< A HREF ="http://bernardodamele.blogspot.com/2007/06/database-management-system-fingerprint.html "> inband error messages</ A > ,
@@ -247,11 +252,6 @@ <H2><A NAME="s2">2.</A> <A HREF="#toc2">Features</A></H2>
247252to fingerprint the web server operating system, the web application
248253technology and, in some circumstances, the back-end DBMS operating system.
249254</ LI >
250- < LI > Full support for three SQL injection techniques: < B > inferential
251- blind SQL injection</ B > , < B > UNION query (inband) SQL injection</ B > and
252- < B > stacked queries (multiple statements) support</ B > . sqlmap can also
253- test for < B > time based blind SQL injection</ B > .
254- </ LI >
255255< LI > Options to retrieve on all four back-end database management system
256256< B > banner</ B > , < B > current user</ B > , < B > current database</ B > ,
257257enumerate < B > users</ B > , < B > users password hashes</ B > , < B > users
@@ -313,6 +313,8 @@ <H2><A NAME="s2">2.</A> <A HREF="#toc2">Features</A></H2>
313313there exist < B > six levels</ B > . The default level is < B > 1</ B > in which
314314information, warnings, errors and tracebacks, if they occur, will be shown.
315315</ LI >
316+ < LI > Granularity in the user's options.
317+ </ LI >
316318< LI > < B > Estimated time of arrival</ B > support for each query, updated
317319in real time while fetching the information to give to the user an
318320overview on how long it will take to retrieve the output.
@@ -329,6 +331,10 @@ <H2><A NAME="s2">2.</A> <A HREF="#toc2">Features</A></H2>
329331< A HREF ="http://metasploit.com/framework/ "> Metasploit</ A > and
330332< A HREF ="http://w3af.sourceforge.net/ "> w3af</ A > .
331333</ LI >
334+ < LI > < B > File system</ B > read and write access and < B > operating
335+ system</ B > command execution by providing own queries, depending on the
336+ session user privileges and back-end DBMS.
337+ </ LI >
332338< LI > < B > PHP setting < CODE > magic_quotes_gpc</ CODE > bypass</ B > by encoding
333339every query string, between single quotes, with < CODE > CHAR</ CODE > , or similar,
334340database management system function.</ LI >
@@ -400,7 +406,7 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
400406$ python sqlmap.py -h
401407
402408 sqlmap/0.6.4 coded by Bernardo Damele A. G. <
[email protected] > 403- and Daniele Bellucci <
[email protected] > 409+ and Daniele Bellucci <
[email protected] > 404410
405411Usage: sqlmap.py [options]
406412
@@ -433,7 +439,7 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
433439 --proxy=PROXY Use a HTTP proxy to connect to the target url
434440 --threads=THREADS Maximum number of concurrent HTTP requests (default 1)
435441 --delay=DELAY Delay in seconds between each HTTP request
436- --timeout=TIMEOUT Seconds to wait before timeout connection (default 10 )
442+ --timeout=TIMEOUT Seconds to wait before timeout connection (default 30 )
437443
438444 Injection:
439445 These options can be used to specify which parameters to test for,
@@ -456,8 +462,9 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
456462 using the default blind SQL injection technique.
457463
458464 --stacked-test Test for stacked queries (multiple statements) support
459- --time-test Test for Time based blind SQL injection
465+ --time-test Test for time based blind SQL injection
460466 --union-test Test for UNION query (inband) SQL injection
467+ --union-tech=UTECH Technique to test for UNION query SQL injection
461468 --union-use Use the UNION query (inband) SQL injection to retrieve
462469 the queries output. No need to go blind
463470
@@ -472,6 +479,7 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
472479 -b, --banner Retrieve DBMS banner
473480 --current-user Retrieve DBMS current user
474481 --current-db Retrieve DBMS current database
482+ --is-dba Detect if the DBMS current user is DBA
475483 --users Enumerate DBMS users
476484 --passwords Enumerate DBMS users password hashes (opt: -U)
477485 --privileges Enumerate DBMS users privileges (opt: -U)
@@ -1878,7 +1886,7 @@ <H3>Test for stacked queries (multiple statements) support</H3>
18781886</ P >
18791887
18801888
1881- < H3 > Test for Time based blind SQL injection</ H3 >
1889+ < H3 > Test for time based blind SQL injection</ H3 >
18821890
18831891< P > Option: < CODE > --time-test</ CODE > </ P >
18841892
@@ -1954,7 +1962,7 @@ <H3>Test for Time based blind SQL injection</H3>
19541962
19551963< H3 > Test for UNION query SQL injection</ H3 >
19561964
1957- < P > Option : < CODE > --union-test</ CODE > </ P >
1965+ < P > Options : < CODE > --union-test</ CODE > and < CODE > --union-tech </ CODE > </ P >
19581966
19591967< P > It is possible to test if the target URL is affected by an < B > inband
19601968SQL injection</ B > vulnerability.
0 commit comments