diff --git a/doc/README.html b/doc/README.html index 065af666f..5ba29dc8e 100644 --- a/doc/README.html +++ b/doc/README.html @@ -9,7 +9,7 @@
$ python sqlmap.py -h
- sqlmap/0.9 - automatic SQL injection and database takeover tool
+ sqlmap/1.0 - automatic SQL injection and database takeover tool
http://sqlmap.sourceforge.net
Usage: python sqlmap.py [options]
@@ -961,6 +961,8 @@ Options:
--dbs Enumerate DBMS databases
--tables Enumerate DBMS database tables
--columns Enumerate DBMS database table columns
+ --schema Enumerate DBMS schema
+ --count Retrieve number of entries for table(s)
--dump Dump DBMS database table entries
--dump-all Dump all DBMS databases tables entries
--search Search column(s), table(s) and/or database name(s)
@@ -1039,6 +1041,7 @@ Options:
--cleanup Clean up the DBMS by sqlmap specific UDF and tables
--forms Parse and test forms on target url
--gpage=GOOGLEPAGE Use Google dork results from specified page number
+ --mobile Imitate smartphone through HTTP User-Agent header
--page-rank Display page rank (PR) for Google dork results
--parse-errors Parse DBMS error messages from response pages
--replicate Replicate dumped data into a sqlite3 database
@@ -1537,6 +1540,28 @@ on the value of --level too.
User-Agent only, provide -p id,user-agent.
+URI injection point
+
+There are special cases when injection point is within the URI itself.
+sqlmap does not perform any automatic test against URI paths, unless
+manually pointed to.
+You have to specify these injection points in the command line by
+appending an asterisk (*) after each URI point that you want
+sqlmap to test for and exploit a SQL injection.
+
+This is particularly useful when, for instance, Apache web server's
+mod_rewrite module is in use or other similar technologies.
+
+An example of valid command line would be:
+
+
+
+$ python sqlmap.py -u "http://targeturl/param1/value1*/param2/value2/"
+
+
+
+
+
Force the database management system name
Switch: --dbms
@@ -2147,6 +2172,20 @@ application's user is connected to, which is always aliased by
public.
+Enumerate database management system schema
+
+Switches: --schema
+
+TODO
+
+
+Retrieve number of entries for table(s)
+
+Switches: --count
+
+TODO
+
+
Dump database table entries
Switches: --dump, -C, -T, -D,
@@ -3081,6 +3120,13 @@ this switch, --gpage, some page other than the first o
to retrieve target URLs from.
+Imitate smartphone
+
+Switch: --mobile
+
+TODO
+
+
Display page rank (PR) for Google dork results
Switch: --page-rank
diff --git a/doc/README.pdf b/doc/README.pdf
index 22e82a260..73a482973 100644
Binary files a/doc/README.pdf and b/doc/README.pdf differ
diff --git a/doc/README.sgml b/doc/README.sgml
index bf8e47d6c..5c865af12 100644
--- a/doc/README.sgml
+++ b/doc/README.sgml
@@ -4,7 +4,7 @@
sqlmap user's manual
by ,
-version 0.9, April 10, 2011
+version 1.0-dev, XXX XX, 2011
This document is the user's manual to use .
@@ -772,7 +772,7 @@ This is strongly recommended before reporting any bug to the
$ python sqlmap.py -h
- sqlmap/0.9 - automatic SQL injection and database takeover tool
+ sqlmap/1.0 - automatic SQL injection and database takeover tool
http://sqlmap.sourceforge.net
Usage: python sqlmap.py [options]
@@ -875,6 +875,8 @@ Options:
--dbs Enumerate DBMS databases
--tables Enumerate DBMS database tables
--columns Enumerate DBMS database table columns
+ --schema Enumerate DBMS schema
+ --count Retrieve number of entries for table(s)
--dump Dump DBMS database table entries
--dump-all Dump all DBMS databases tables entries
--search Search column(s), table(s) and/or database name(s)
@@ -953,6 +955,7 @@ Options:
--cleanup Clean up the DBMS by sqlmap specific UDF and tables
--forms Parse and test forms on target url
--gpage=GOOGLEPAGE Use Google dork results from specified page number
+ --mobile Imitate smartphone through HTTP User-Agent header
--page-rank Display page rank (PR) for Google dork results
--parse-errors Parse DBMS error messages from response pages
--replicate Replicate dumped data into a sqlite3 database
@@ -1512,6 +1515,29 @@ For instance, to test for GET parameter id and for HTTP
User-Agent only, provide -p id,user-agent.
+URI injection point
+
+
+There are special cases when injection point is within the URI itself.
+sqlmap does not perform any automatic test against URI paths, unless
+manually pointed to.
+You have to specify these injection points in the command line by
+appending an asterisk (*) after each URI point that you want
+sqlmap to test for and exploit a SQL injection.
+
+
+This is particularly useful when, for instance, Apache web server's
+ module is in use or other similar technologies.
+
+
+An example of valid command line would be:
+
+
+$ python sqlmap.py -u "http://targeturl/param1/value1*/param2/value2/"
+
+
+
Force the database management system name
@@ -2189,6 +2215,24 @@ application's user is connected to, which is always aliased by
public.
+Enumerate database management system schema
+
+
+Switches: --schema
+
+
+TODO
+
+
+Retrieve number of entries for table(s)
+
+
+Switches: --count
+
+
+TODO
+
+
Dump database table entries
@@ -3201,6 +3245,15 @@ this switch, --gpage, some page other than the first one
to retrieve target URLs from.
+Imitate smartphone
+
+
+Switch: --mobile
+
+
+TODO
+
+
Display page rank (PR) for Google dork results