@@ -247,7 +247,7 @@ <H2><A NAME="ss1.4">1.4</A> <A HREF="#toc1.4">Demo</A>
247247</ H2 >
248248
249249< P > You can watch several demo videos, they are hosted on
250- < A HREF ="http://www.youtube.com/user/inquisb#p /u "> YouTube</ A > and linked
250+ < A HREF ="http://www.youtube.com/user/inquisb#g /u "> YouTube</ A > and linked
251251from
252252< A HREF ="http://sqlmap.sourceforge.net/demo.html "> here</ A > .</ P >
253253
@@ -276,13 +276,12 @@ <H2><A NAME="ss2.1">2.1</A> <A HREF="#toc2.1">Generic features</A>
276276targets from
277277< A HREF ="http://portswigger.net/suite/ "> Burp proxy</ A >
278278requests log file or
279- < A HREF ="http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project "> WebScarab proxy</ A >
280- < CODE > conversations/</ CODE > folder, get the whole HTTP request from a text
281- file or get the list of targets by providing sqlmap with a Google dork
282- which queries
283- < A HREF ="http://www.google.com "> Google</ A > search engine and
284- parses its results page. You can also define a regular-expression based
285- scope that is used to identify which of the parsed addresses to test.
279+ < A HREF ="http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project "> WebScarab proxy</ A > < CODE > conversations/</ CODE > folder, get the whole HTTP
280+ request from a text file or get the list of targets by providing sqlmap
281+ with a Google dork which queries
282+ < A HREF ="http://www.google.com "> Google</ A > search engine and parses its results page. You can also
283+ define a regular-expression based scope that is used to identify which of
284+ the parsed addresses to test.
286285</ LI >
287286< LI > Automatically tests all provided < B > GET</ B > parameters,
288287< B > POST</ B > parameters, HTTP < B > Cookie</ B > header values and HTTP
@@ -457,10 +456,8 @@ <H2><A NAME="ss2.3">2.3</A> <A HREF="#toc2.3">Takeover features</A>
457456the
458457< A HREF ="http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0346.html "> kitrap0d</ A > technique (
459458< A HREF ="http://www.microsoft.com/technet/security/bulletin/ms10-015.mspx "> MS10-015</ A > ) or via
460- < A HREF ="http://www.argeniss.com/research/TokenKidnapping.pdf "> Windows Access Tokens kidnapping</ A > by using either Meterpreter's
461- < CODE > incognito</ CODE > extension or < CODE > Churrasco</ CODE > (
462- < A HREF ="http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx "> MS09-012</ A > ) stand-alone executable
463- as per user's choice.
459+ < A HREF ="http://www.argeniss.com/research/TokenKidnapping.pdf "> Windows Access Tokens kidnapping</ A > by using Meterpreter's
460+ < CODE > incognito</ CODE > extension.
464461</ LI >
465462< LI > Support to access (read/add/delete) Windows registry hives.</ LI >
466463</ UL >
@@ -538,10 +535,8 @@ <H2><A NAME="s3">3.</A> <A HREF="#toc3">Download and update</A></H2>
538535time the sqlmap new version has been released.</ LI >
539536< LI > The Debian and Red Hat installation packages (deb and rpm) are
540537compliant with the Linux distributions' packaging guidelines. This implies
541- that they do not support the update features and do not include
542- third-party softwares Churrasco (used to perform Windows token kidnapping,
543- see below) and UPX (used to pack the Metasploit payload stager in some
544- cases, see below).</ LI >
538+ that they do not support the update features and do not include UPX (used
539+ to pack the Metasploit payload stager in some cases, see below).</ LI >
545540< LI > The Windows binary package (exe) can't update itself and does not
546541support the takeover out-of-band features because they rely on
547542Metasploit's < CODE > msfcli</ CODE > which is not available for Windows.</ LI >
@@ -694,7 +689,7 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
694689 --os-pwn Prompt for an out-of-band shell, meterpreter or VNC
695690 --os-smbrelay One click prompt for an OOB shell, meterpreter or VNC
696691 --os-bof Stored procedure buffer overflow exploitation
697- --priv-esc User priv escalation by abusing Windows access tokens
692+ --priv-esc Database process' user privilege escalation
698693 --msf-path=MSFPATH Local path where Metasploit Framework 3 is installed
699694 --tmp-path=TMPPATH Remote absolute path of temporary files directory
700695
@@ -4968,11 +4963,8 @@ <H3>Prompt for an out-of-band shell, Meterpreter or VNC</H3>
49684963the
49694964< A HREF ="http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0346.html "> kitrap0d</ A > technique (
49704965< A HREF ="http://www.microsoft.com/technet/security/bulletin/ms10-015.mspx "> MS10-015</ A > ) or via
4971- < A HREF ="http://www.argeniss.com/research/TokenKidnapping.pdf "> Windows Access Tokens kidnapping</ A > by using either Meterpreter's
4972- < A HREF ="http://sourceforge.net/projects/incognito/ "> incognito</ A > extension or
4973- < A HREF ="http://www.argeniss.com/research/Churrasco.zip "> Churrasco</ A >
4974- (
4975- < A HREF ="http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx "> MS09-012</ A > ) stand-alone executable as per user's choice.</ P >
4966+ < A HREF ="http://www.argeniss.com/research/TokenKidnapping.pdf "> Windows Access Tokens kidnapping</ A > by using Meterpreter's
4967+ < A HREF ="http://sourceforge.net/projects/incognito/ "> incognito</ A > extension.</ P >
49764968
49774969< P > Example on a < B > Microsoft SQL Server 2005 Service Pack 0</ B > running as
49784970< CODE > NETWORK SERVICE</ CODE > on the target:</ P >
@@ -5023,9 +5015,7 @@ <H3>Prompt for an out-of-band shell, Meterpreter or VNC</H3>
50235015[hh:mm:53] [INFO] creation in progress ..... done
50245016[hh:mm:58] [INFO] compression in progress . done
50255017[hh:mm:59] [INFO] uploading payload stager to 'C:/WINDOWS/Temp/tmpmqyws.exe'
5026- do you want sqlmap to upload Churrasco and call the Metasploit payload stager as its
5027- argument so that it will be started as SYSTEM? [y/N]
5028- [hh:mm:22] [INFO] running Metasploit Framework 3 command line interface locally, wait..
5018+ [hh:mm:05] [INFO] running Metasploit Framework 3 command line interface locally, wait..
50295019[*] Please wait while we load the module tree...
50305020[*] Started reverse handler on 172.16.213.1:44780
50315021[*] Starting the payload handler...
@@ -5144,11 +5134,9 @@ <H3>One click prompt for an out-of-band shell, meterpreter or VNC</H3>
51445134[hh:mm:16] [INFO] which is the back-end DBMS address? [172.16.213.131] 172.16.213.131
51455135[hh:mm:16] [INFO] which remote port numer do you want to use? [4907] 4907
51465136[hh:mm:16] [INFO] which payload do you want to use?
5147- [1] Reflective Meterpreter (default)
5148- [2] PatchUp Meterpreter (only from Metasploit development revision 6742)
5149- [3] Shell
5150- [4] Reflective VNC
5151- [5] PatchUp VNC (only from Metasploit development revision 6742)
5137+ [1] Meterpreter (default)
5138+ [2] Shell
5139+ [3] VNC
51525140> 1
51535141[hh:mm:16] [INFO] which SMB port do you want to use?
51545142[1] 139/TCP (default)
0 commit comments