diff --git a/lib/core/optiondict.py b/lib/core/optiondict.py index 69345770b..83d4e7b13 100644 --- a/lib/core/optiondict.py +++ b/lib/core/optiondict.py @@ -74,6 +74,7 @@ optDict = { "eRegexp": "string", "thold": "float", "useBetween": "boolean", + "space": "string", }, "Techniques": { diff --git a/lib/parse/cmdline.py b/lib/parse/cmdline.py index e6be4a386..115346d99 100644 --- a/lib/parse/cmdline.py +++ b/lib/parse/cmdline.py @@ -195,7 +195,7 @@ def cmdLineParser(): help="Page comparison threshold value (0.0-1.0)") injection.add_option("--space", dest="space", - help="Use defined string instead of standard ' '") + help="Use defined string for space instead of standard ' '") injection.add_option("--use-between", dest="useBetween", action="store_true", diff --git a/sqlmap.conf b/sqlmap.conf index 0022e5bd9..bcc142be8 100644 --- a/sqlmap.conf +++ b/sqlmap.conf @@ -195,6 +195,9 @@ thold = # Valid: True or False useBetween = False +# Use defined string for space instead of standard ' ' +space = + # These options can be used to test for specific SQL injection technique # or to use one of them to exploit the affected parameter(s) rather than # using the default blind SQL injection technique.