@@ -85,9 +85,6 @@ aCred =
8585# Syntax: key_file,cert_file
8686aCert =
8787
88- # Use persistent HTTP(s) connections
89- keepAlive = False
90-
9188# Use a HTTP proxy to connect to the target url.
9289# Syntax: http://address:port
9390proxy =
@@ -101,12 +98,6 @@ pCred =
10198# Valid: True or False
10299ignoreProxy = False
103100
104- # Maximum number of concurrent HTTP requests (handled with Python threads)
105- # to be used in the inference SQL injection attack.
106- # Valid: integer
107- # Default: 1
108- threads = 1
109-
110101# Delay in seconds between each HTTP request.
111102# Valid: float
112103# Default: 0
@@ -137,6 +128,31 @@ safUrl =
137128saFreq = 0
138129
139130
131+ # These options can be used to optimize the performance of sqlmap.
132+ [Optimization]
133+
134+ # Use all optimization options.
135+ # Valid: True or False
136+ optimize = False
137+
138+ # Predict common queries output.
139+ # Valid: True or False
140+ predictOutput = False
141+
142+ # Use persistent HTTP(s) connections.
143+ keepAlive = False
144+
145+ # Retrieve page length without actual HTTP response body.
146+ # Valid: True or False
147+ nullConnection = False
148+
149+ # Maximum number of concurrent HTTP(s) requests (handled with Python threads)
150+ # to be used in the inference SQL injection attack.
151+ # Valid: integer
152+ # Default: 1
153+ threads = 1
154+
155+
140156# These options can be used to specify which parameters to test for,
141157# provide custom injection payloads and how to parse and compare HTTP
142158# responses page content when using the blind SQL injection technique.
@@ -149,7 +165,8 @@ testParameter =
149165# Force back-end DBMS to this value. If this option is set, the back-end
150166# DBMS identification process will be minimized as needed.
151167# If not set, sqlmap will detect back-end DBMS automatically by default.
152- # Valid: mssql, mysql, mysql 4, mysql 5, oracle, pgsql
168+ # Valid: mssql, mysql, mysql 4, mysql 5, oracle, pgsql, sqlite, sqlite3,
169+ # access, firebird, maxdb, sybase
153170dbms =
154171
155172# Force back-end DBMS operating system to this value. If this option is
@@ -196,9 +213,13 @@ eRegexp =
196213# Valid: 0.0-1.0
197214thold =
198215
199- # Use operator BETWEEN instead of default '>'
216+ # Compare pages based only on their textual content
200217# Valid: True or False
201- useBetween = False
218+ textOnly = False
219+
220+ # Use given script(s) for tampering injection data
221+ tamper =
222+
202223
203224# These options can be used to test for specific SQL injection technique
204225# or to use one of them to exploit the affected parameter(s) rather than
@@ -366,6 +387,7 @@ cExists = False
366387# Valid: text file containing one table name per line
367388tableFile =
368389
390+
369391# These options can be used to create custom user-defined functions.
370392[User-defined function]
371393
@@ -438,12 +460,15 @@ tmpPath =
438460[Windows]
439461
440462# Read a Windows registry key value
463+ # Valid: True or False
441464regRead = False
442465
443466# Write a Windows registry key value data
467+ # Valid: True or False
444468regAdd = False
445469
446470# Delete a Windows registry key value
471+ # Valid: True or False
447472regDel = False
448473
449474# Windows registry key
@@ -468,8 +493,13 @@ xmlFile =
468493sessionFile =
469494
470495# Flush session file for current target.
496+ # Valid: True or False
471497flushSession = False
472498
499+ # Parse and test forms on target url
500+ # Valid: True or False
501+ forms = False
502+
473503# Retrieve each query output length and calculate the estimated time of
474504# arrival in real time.
475505# Valid: True or False
0 commit comments