From 336b29fa421860b4c4f8fe1f77e9b0621e898fbc Mon Sep 17 00:00:00 2001 From: stamparm Date: Wed, 24 Apr 2013 12:10:26 +0200 Subject: [PATCH] Minor language update --- Usage.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Usage.md b/Usage.md index bc2dbaeff..9874105ef 100644 --- a/Usage.md +++ b/Usage.md @@ -198,7 +198,7 @@ --flush-session Flush session files for current target --force-ssl Force usage of SSL/HTTPS requests --forms Parse and test forms on target URL - --fresh-queries Ignores query results stored in session file + --fresh-queries Ignore query results stored in session file --hex Uses DBMS hex function(s) for data retrieval --output-dir=ODIR Custom output directory path --parse-errors Parse and display DBMS error messages from responses @@ -1516,7 +1516,7 @@ Both of the above mentioned instances, and many others, appear as `
` and Provide sqlmap with `--forms` as well as the page where the form can be found as the target URL (`-u`) and sqlmap will request the target URL for you, parse the forms it has and guide you through to test for SQL injection on those form input fields (parameters) rather than the target URL provided. -### Ignores query results stored in session file +### Ignore query results stored in session file Switch: `--fresh-queries`