Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit bc3b4c6

Browse files
committed
Minor layout adjustments in the user's manual
1 parent fd7cb91 commit bc3b4c6

3 files changed

Lines changed: 30 additions & 28 deletions

File tree

doc/README.html

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -58,15 +58,16 @@ <H2><A NAME="toc7">7.</A> <A HREF="README.html#s7">Authors</A></H2>
5858
<HR>
5959
<H2><A NAME="s1">1.</A> <A HREF="#toc1">Introduction</A></H2>
6060

61-
<P>sqlmap is an automatic
62-
<A HREF="http://www.google.com/search?q=SQL+injection">SQL injection</A> tool. Its goal is to detect and take advantage of
63-
SQL injection vulnerabilities on web applications. Once it detects one or
64-
more SQL injections on the target host, the user can choose among a
65-
variety of options to perform an extensive back-end database management
66-
system fingerprint, retrieve DBMS session user and database, enumerate
67-
users, password hashes, privileges, databases, dump entire or user's
68-
specific DBMS tables/columns, run his own SQL <CODE>SELECT</CODE> statement,
69-
read specific files on the file system and much more.</P>
61+
<P>sqlmap is an open source command-line automatic
62+
<A HREF="http://www.google.com/search?q=SQL+injection">SQL injection</A>
63+
tool.
64+
Its goal is to detect and take advantage of SQL injection vulnerabilities
65+
in web applications. Once it detects one or more SQL injections on the
66+
target host, the user can choose among a variety of options to perform an
67+
extensive back-end database management system fingerprint, retrieve DBMS
68+
session user and database, enumerate users, password hashes, privileges,
69+
databases, dump entire or user's specific DBMS tables/columns, run his own
70+
SQL statement, read specific files on the file system and more.</P>
7071

7172

7273
<H2><A NAME="ss1.1">1.1</A> <A HREF="#toc1.1">Requirements</A>
@@ -232,8 +233,8 @@ <H2><A NAME="s2">2.</A> <A HREF="#toc2">Features</A></H2>
232233
<UL>
233234
<LI>Full support for <B>MySQL</B>, <B>Oracle</B>, <B>PostgreSQL</B>
234235
and <B>Microsoft SQL Server</B> back-end database management systems.
235-
Besides these four database management systems, sqlmap can also identify
236-
Microsoft Access, DB2, Informix, Sybase and Interbase.
236+
Besides these four database management systems software. sqlmap can also
237+
identify Microsoft Access, DB2, Informix, Sybase and Interbase.
237238
</LI>
238239
<LI><B>Extensive back-end database management system fingerprint</B>
239240
based upon
@@ -3596,9 +3597,9 @@ <H3>Run your own SQL statement</H3>
35963597
</CODE></BLOCKQUOTE>
35973598
</P>
35983599

3599-
<P>The SQL shell option gives you access to run your own SQL <CODE>SELECT</CODE>
3600-
statement interactively, like a SQL console logged into the back-end
3601-
database management system.
3600+
<P>The SQL shell option gives you access to run your own SQL statement
3601+
interactively, like a SQL console logged into the back-end database
3602+
management system.
36023603
This feature has TAB completion and history support.</P>
36033604

36043605
<P>Example of history support on a <B>PostgreSQL 8.3.5</B> target:</P>

doc/README.pdf

-15 Bytes
Binary file not shown.

doc/README.sgml

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -16,15 +16,16 @@ for the latest version.
1616

1717
<sect>Introduction
1818
<p>
19-
sqlmap is an automatic <htmlurl url="http://www.google.com/search?q=SQL+injection"
20-
name="SQL injection"> tool. Its goal is to detect and take advantage of
21-
SQL injection vulnerabilities on web applications. Once it detects one or
22-
more SQL injections on the target host, the user can choose among a
23-
variety of options to perform an extensive back-end database management
24-
system fingerprint, retrieve DBMS session user and database, enumerate
25-
users, password hashes, privileges, databases, dump entire or user's
26-
specific DBMS tables/columns, run his own SQL <tt>SELECT</tt> statement,
27-
read specific files on the file system and much more.
19+
sqlmap is an open source command-line automatic
20+
<htmlurl url="http://www.google.com/search?q=SQL+injection" name="SQL injection">
21+
tool.
22+
Its goal is to detect and take advantage of SQL injection vulnerabilities
23+
in web applications. Once it detects one or more SQL injections on the
24+
target host, the user can choose among a variety of options to perform an
25+
extensive back-end database management system fingerprint, retrieve DBMS
26+
session user and database, enumerate users, password hashes, privileges,
27+
databases, dump entire or user's specific DBMS tables/columns, run his own
28+
SQL statement, read specific files on the file system and more.
2829

2930

3031
<sect1>Requirements
@@ -189,8 +190,8 @@ Major features implemented in sqlmap include:
189190
<itemize>
190191
<item>Full support for <bf>MySQL</bf>, <bf>Oracle</bf>, <bf>PostgreSQL</bf>
191192
and <bf>Microsoft SQL Server</bf> back-end database management systems.
192-
Besides these four database management systems, sqlmap can also identify
193-
Microsoft Access, DB2, Informix, Sybase and Interbase.
193+
Besides these four database management systems software. sqlmap can also
194+
identify Microsoft Access, DB2, Informix, Sybase and Interbase.
194195

195196
<item><bf>Extensive back-end database management system fingerprint</bf>
196197
based upon
@@ -3497,9 +3498,9 @@ SELECT user, host, password FROM mysql.user LIMIT 1, 3 [3]:
34973498
</verb></tscreen>
34983499

34993500
<p>
3500-
The SQL shell option gives you access to run your own SQL <tt>SELECT</tt>
3501-
statement interactively, like a SQL console logged into the back-end
3502-
database management system.
3501+
The SQL shell option gives you access to run your own SQL statement
3502+
interactively, like a SQL console logged into the back-end database
3503+
management system.
35033504
This feature has TAB completion and history support.
35043505

35053506
<p>

0 commit comments

Comments
 (0)