diff --git a/doc/README.html b/doc/README.html index 065af666f..5ba29dc8e 100644 --- a/doc/README.html +++ b/doc/README.html @@ -9,7 +9,7 @@
$ python sqlmap.py -h - sqlmap/0.9 - automatic SQL injection and database takeover tool + sqlmap/1.0 - automatic SQL injection and database takeover tool http://sqlmap.sourceforge.net Usage: python sqlmap.py [options] @@ -961,6 +961,8 @@ Options: --dbs Enumerate DBMS databases --tables Enumerate DBMS database tables --columns Enumerate DBMS database table columns + --schema Enumerate DBMS schema + --count Retrieve number of entries for table(s) --dump Dump DBMS database table entries --dump-all Dump all DBMS databases tables entries --search Search column(s), table(s) and/or database name(s) @@ -1039,6 +1041,7 @@ Options: --cleanup Clean up the DBMS by sqlmap specific UDF and tables --forms Parse and test forms on target url --gpage=GOOGLEPAGE Use Google dork results from specified page number + --mobile Imitate smartphone through HTTP User-Agent header --page-rank Display page rank (PR) for Google dork results --parse-errors Parse DBMS error messages from response pages --replicate Replicate dumped data into a sqlite3 database @@ -1537,6 +1540,28 @@ on the value of-
-level
too.User-Agent
only, provide-p id,user-agent
. +URI injection point
+ +There are special cases when injection point is within the URI itself. +sqlmap does not perform any automatic test against URI paths, unless +manually pointed to. +You have to specify these injection points in the command line by +appending an asterisk (
+ +*
) after each URI point that you want +sqlmap to test for and exploit a SQL injection.This is particularly useful when, for instance, Apache web server's +mod_rewrite module is in use or other similar technologies.
+ +An example of valid command line would be:
++
+ + ++
+$ python sqlmap.py -u "http://targeturl/param1/value1*/param2/value2/" ++Force the database management system name
Switch:
@@ -2147,6 +2172,20 @@ application's user is connected to, which is always aliased by-
-dbms
public
. +Enumerate database management system schema
+ +Switches:
+ +-
-schema
TODO
+ + +Retrieve number of entries for table(s)
+ +Switches:
+ +-
-count
TODO
+ +Dump database table entries
Switches:
+-
-dump
,-C
,-T
,-D
, @@ -3081,6 +3120,13 @@ this switch,-
-gpage
, some page other than the first o to retrieve target URLs from.Imitate smartphone
+ +Switch:
+ +-
-mobile
TODO
+ +Display page rank (PR) for Google dork results
Switch:
diff --git a/doc/README.pdf b/doc/README.pdf index 22e82a260..73a482973 100644 Binary files a/doc/README.pdf and b/doc/README.pdf differ diff --git a/doc/README.sgml b/doc/README.sgml index bf8e47d6c..5c865af12 100644 --- a/doc/README.sgml +++ b/doc/README.sgml @@ -4,7 +4,7 @@-
-page-rank
sqlmap user's manual by , - version 0.9, April 10, 2011 + version 1.0-dev, XXX XX, 2011 This document is the user's manual to use @@ -772,7 +772,7 @@ This is strongly recommended. before reporting any bug to the$ python sqlmap.py -h - sqlmap/0.9 - automatic SQL injection and database takeover tool + sqlmap/1.0 - automatic SQL injection and database takeover tool http://sqlmap.sourceforge.net Usage: python sqlmap.py [options] @@ -875,6 +875,8 @@ Options: --dbs Enumerate DBMS databases --tables Enumerate DBMS database tables --columns Enumerate DBMS database table columns + --schema Enumerate DBMS schema + --count Retrieve number of entries for table(s) --dump Dump DBMS database table entries --dump-all Dump all DBMS databases tables entries --search Search column(s), table(s) and/or database name(s) @@ -953,6 +955,7 @@ Options: --cleanup Clean up the DBMS by sqlmap specific UDF and tables --forms Parse and test forms on target url --gpage=GOOGLEPAGE Use Google dork results from specified page number + --mobile Imitate smartphone through HTTP User-Agent header --page-rank Display page rank (PR) for Google dork results --parse-errors Parse DBMS error messages from response pages --replicate Replicate dumped data into a sqlite3 database @@ -1512,6 +1515,29 @@ For instance, to test for GET parameter id and for HTTP User-Agent only, provide -p id,user-agent. + URI injection point + + +There are special cases when injection point is within the URI itself. +sqlmap does not perform any automatic test against URI paths, unless +manually pointed to. +You have to specify these injection points in the command line by +appending an asterisk (*) after each URI point that you want +sqlmap to test for and exploit a SQL injection. + +
+This is particularly useful when, for instance, Apache web server's +
module is in use or other similar technologies. + + +An example of valid command line would be: + +
+ + +$ python sqlmap.py -u "http://targeturl/param1/value1*/param2/value2/" + Force the database management system name @@ -2189,6 +2215,24 @@ application's user is connected to, which is always aliased by public. +
Enumerate database management system schema + + +Switches: --schema + +
+TODO + + +
Retrieve number of entries for table(s) + + +Switches: --count + +
+TODO + +
Dump database table entries @@ -3201,6 +3245,15 @@ this switch, --gpage, some page other than the first one to retrieve target URLs from. +
Imitate smartphone + + +Switch: --mobile + +
+TODO + +
Display page rank (PR) for Google dork results