Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 8f973ce

Browse files
committed
Minor layout adjustments
1 parent 161590e commit 8f973ce

5 files changed

Lines changed: 38 additions & 22 deletions

File tree

doc/README.html

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -236,6 +236,11 @@ <H2><A NAME="s2">2.</A> <A HREF="#toc2">Features</A></H2>
236236
Besides these four database management systems software. sqlmap can also
237237
identify Microsoft Access, DB2, Informix, Sybase and Interbase.
238238
</LI>
239+
<LI>Full support for three SQL injection techniques: <B> inferential
240+
blind SQL injection</B>, <B>UNION query (inband) SQL injection</B> and
241+
<B>stacked queries (multiple statements) support</B>. sqlmap can also
242+
test for <B>time based blind SQL injection</B>.
243+
</LI>
239244
<LI><B>Extensive back-end database management system fingerprint</B>
240245
based upon
241246
<A HREF="http://bernardodamele.blogspot.com/2007/06/database-management-system-fingerprint.html">inband error messages</A>,
@@ -247,11 +252,6 @@ <H2><A NAME="s2">2.</A> <A HREF="#toc2">Features</A></H2>
247252
to fingerprint the web server operating system, the web application
248253
technology and, in some circumstances, the back-end DBMS operating system.
249254
</LI>
250-
<LI>Full support for three SQL injection techniques: <B> inferential
251-
blind SQL injection</B>, <B>UNION query (inband) SQL injection</B> and
252-
<B>stacked queries (multiple statements) support</B>. sqlmap can also
253-
test for <B>time based blind SQL injection</B>.
254-
</LI>
255255
<LI>Options to retrieve on all four back-end database management system
256256
<B>banner</B>, <B>current user</B>, <B>current database</B>,
257257
enumerate <B>users</B>, <B>users password hashes</B>, <B>users
@@ -313,6 +313,8 @@ <H2><A NAME="s2">2.</A> <A HREF="#toc2">Features</A></H2>
313313
there exist <B>six levels</B>. The default level is <B>1</B> in which
314314
information, warnings, errors and tracebacks, if they occur, will be shown.
315315
</LI>
316+
<LI>Granularity in the user's options.
317+
</LI>
316318
<LI><B>Estimated time of arrival</B> support for each query, updated
317319
in real time while fetching the information to give to the user an
318320
overview on how long it will take to retrieve the output.
@@ -329,6 +331,10 @@ <H2><A NAME="s2">2.</A> <A HREF="#toc2">Features</A></H2>
329331
<A HREF="http://metasploit.com/framework/">Metasploit</A> and
330332
<A HREF="http://w3af.sourceforge.net/">w3af</A>.
331333
</LI>
334+
<LI><B>File system</B> read and write access and <B>operating
335+
system</B> command execution by providing own queries, depending on the
336+
session user privileges and back-end DBMS.
337+
</LI>
332338
<LI><B>PHP setting <CODE>magic_quotes_gpc</CODE> bypass</B> by encoding
333339
every query string, between single quotes, with <CODE>CHAR</CODE>, or similar,
334340
database management system function.</LI>
@@ -400,7 +406,7 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
400406
$ python sqlmap.py -h
401407

402408
sqlmap/0.6.4 coded by Bernardo Damele A. G. &lt;[email protected]>
403-
and Daniele Bellucci &lt;[email protected]>
409+
and Daniele Bellucci &lt;[email protected]>
404410

405411
Usage: sqlmap.py [options]
406412

@@ -433,7 +439,7 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
433439
--proxy=PROXY Use a HTTP proxy to connect to the target url
434440
--threads=THREADS Maximum number of concurrent HTTP requests (default 1)
435441
--delay=DELAY Delay in seconds between each HTTP request
436-
--timeout=TIMEOUT Seconds to wait before timeout connection (default 10)
442+
--timeout=TIMEOUT Seconds to wait before timeout connection (default 30)
437443

438444
Injection:
439445
These options can be used to specify which parameters to test for,
@@ -456,8 +462,9 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
456462
using the default blind SQL injection technique.
457463

458464
--stacked-test Test for stacked queries (multiple statements) support
459-
--time-test Test for Time based blind SQL injection
465+
--time-test Test for time based blind SQL injection
460466
--union-test Test for UNION query (inband) SQL injection
467+
--union-tech=UTECH Technique to test for UNION query SQL injection
461468
--union-use Use the UNION query (inband) SQL injection to retrieve
462469
the queries output. No need to go blind
463470

@@ -472,6 +479,7 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
472479
-b, --banner Retrieve DBMS banner
473480
--current-user Retrieve DBMS current user
474481
--current-db Retrieve DBMS current database
482+
--is-dba Detect if the DBMS current user is DBA
475483
--users Enumerate DBMS users
476484
--passwords Enumerate DBMS users password hashes (opt: -U)
477485
--privileges Enumerate DBMS users privileges (opt: -U)
@@ -1878,7 +1886,7 @@ <H3>Test for stacked queries (multiple statements) support</H3>
18781886
</P>
18791887

18801888

1881-
<H3>Test for Time based blind SQL injection</H3>
1889+
<H3>Test for time based blind SQL injection</H3>
18821890

18831891
<P>Option: <CODE>--time-test</CODE></P>
18841892

@@ -1954,7 +1962,7 @@ <H3>Test for Time based blind SQL injection</H3>
19541962

19551963
<H3>Test for UNION query SQL injection</H3>
19561964

1957-
<P>Option: <CODE>--union-test</CODE></P>
1965+
<P>Options: <CODE>--union-test</CODE> and <CODE>--union-tech</CODE></P>
19581966

19591967
<P>It is possible to test if the target URL is affected by an <B>inband
19601968
SQL injection</B> vulnerability.

doc/README.pdf

257 Bytes
Binary file not shown.

doc/README.sgml

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -193,6 +193,11 @@ and <bf>Microsoft SQL Server</bf> back-end database management systems.
193193
Besides these four database management systems software. sqlmap can also
194194
identify Microsoft Access, DB2, Informix, Sybase and Interbase.
195195

196+
<item>Full support for three SQL injection techniques: <bf> inferential
197+
blind SQL injection</bf>, <bf>UNION query (inband) SQL injection</bf> and
198+
<bf>stacked queries (multiple statements) support</bf>. sqlmap can also
199+
test for <bf>time based blind SQL injection</bf>.
200+
196201
<item><bf>Extensive back-end database management system fingerprint</bf>
197202
based upon
198203
<htmlurl url="http://bernardodamele.blogspot.com/2007/06/database-management-system-fingerprint.html" name="inband error messages">,
@@ -204,11 +209,6 @@ database management system name if you already know it. sqlmap is also able
204209
to fingerprint the web server operating system, the web application
205210
technology and, in some circumstances, the back-end DBMS operating system.
206211

207-
<item>Full support for three SQL injection techniques: <bf> inferential
208-
blind SQL injection</bf>, <bf>UNION query (inband) SQL injection</bf> and
209-
<bf>stacked queries (multiple statements) support</bf>. sqlmap can also
210-
test for <bf>time based blind SQL injection</bf>.
211-
212212
<item>Options to retrieve on all four back-end database management system
213213
<bf>banner</bf>, <bf>current user</bf>, <bf>current database</bf>,
214214
enumerate <bf>users</bf>, <bf>users password hashes</bf>, <bf>users
@@ -269,6 +269,8 @@ randomly selected from a text file.
269269
there exist <bf>six levels</bf>. The default level is <bf>1</bf> in which
270270
information, warnings, errors and tracebacks, if they occur, will be shown.
271271

272+
<item>Granularity in the user's options.
273+
272274
<item><bf>Estimated time of arrival</bf> support for each query, updated
273275
in real time while fetching the information to give to the user an
274276
overview on how long it will take to retrieve the output.
@@ -285,6 +287,10 @@ save command line options on a configuration INI file.
285287
<htmlurl url="http://metasploit.com/framework/" name="Metasploit"> and <htmlurl
286288
url="http://w3af.sourceforge.net/" name="w3af">.
287289

290+
<item><bf>File system</bf> read and write access and <bf>operating
291+
system</bf> command execution by providing own queries, depending on the
292+
session user privileges and back-end DBMS.
293+
288294
<item><bf>PHP setting <tt>magic_quotes_gpc</tt> bypass</bf> by encoding
289295
every query string, between single quotes, with <tt>CHAR</tt>, or similar,
290296
database management system function.
@@ -355,7 +361,7 @@ and <htmlurl url="mailto:[email protected]" name="Daniele Bellucci">.
355361
$ python sqlmap.py -h
356362

357363
sqlmap/0.6.4 coded by Bernardo Damele A. G. <[email protected]>
358-
and Daniele Bellucci <[email protected]>
364+
and Daniele Bellucci <[email protected]>
359365

360366
Usage: sqlmap.py [options]
361367

@@ -388,7 +394,7 @@ Options:
388394
--proxy=PROXY Use a HTTP proxy to connect to the target url
389395
--threads=THREADS Maximum number of concurrent HTTP requests (default 1)
390396
--delay=DELAY Delay in seconds between each HTTP request
391-
--timeout=TIMEOUT Seconds to wait before timeout connection (default 10)
397+
--timeout=TIMEOUT Seconds to wait before timeout connection (default 30)
392398

393399
Injection:
394400
These options can be used to specify which parameters to test for,
@@ -411,8 +417,9 @@ Options:
411417
using the default blind SQL injection technique.
412418

413419
--stacked-test Test for stacked queries (multiple statements) support
414-
--time-test Test for Time based blind SQL injection
420+
--time-test Test for time based blind SQL injection
415421
--union-test Test for UNION query (inband) SQL injection
422+
--union-tech=UTECH Technique to test for UNION query SQL injection
416423
--union-use Use the UNION query (inband) SQL injection to retrieve
417424
the queries output. No need to go blind
418425

@@ -427,6 +434,7 @@ Options:
427434
-b, --banner Retrieve DBMS banner
428435
--current-user Retrieve DBMS current user
429436
--current-db Retrieve DBMS current database
437+
--is-dba Detect if the DBMS current user is DBA
430438
--users Enumerate DBMS users
431439
--passwords Enumerate DBMS users password hashes (opt: -U)
432440
--privileges Enumerate DBMS users privileges (opt: -U)
@@ -1813,7 +1821,7 @@ stacked queries support: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'wRcBC'=
18131821
</verb></tscreen>
18141822

18151823

1816-
<sect2>Test for Time based blind SQL injection
1824+
<sect2>Test for time based blind SQL injection
18171825

18181826
<p>
18191827
Option: <tt>--time-test</tt>
@@ -1886,7 +1894,7 @@ time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';
18861894
<sect2>Test for UNION query SQL injection
18871895

18881896
<p>
1889-
Option: <tt>--union-test</tt>
1897+
Options: <tt>--union-test</tt> and <tt>--union-tech</tt>
18901898

18911899
<p>
18921900
It is possible to test if the target URL is affected by an <bf>inband

lib/parse/cmdline.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ def cmdLineParser():
163163

164164
techniques.add_option("--time-test", dest="timeTest",
165165
action="store_true",
166-
help="Test for Time based blind SQL injection")
166+
help="Test for time based blind SQL injection")
167167

168168
techniques.add_option("--union-test", dest="unionTest",
169169
action="store_true",

sqlmap.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ eRegexp =
133133
# Valid: True or False
134134
stackedTest = False
135135

136-
# Test for Time based blind SQL injection.
136+
# Test for time based blind SQL injection.
137137
# Valid: True or False
138138
timeTest = False
139139

0 commit comments

Comments
 (0)