diff --git a/doc/README.html b/doc/README.html index 6d01bf3cb..2e063a14b 100644 --- a/doc/README.html +++ b/doc/README.html @@ -181,14 +181,14 @@ in the following section to go ahead with the exploiting.
sqlmap implements two techniques to exploit a SQL injection vulnerability:
+sqlmap implements three techniques to exploit a SQL injection +vulnerability:
SELECT
sub-statement, or any other SQL statement
-whose the user want to retrieve the output.
+SELECT
sub-statement, or any other SQL
+statement whose the user want to retrieve the output.
For each HTTP response, by making a comparison based upon HTML page
content hashes, or string matches, with the original request, the tool
determines the output value of the statement character by character.
@@ -196,13 +196,13 @@ The bisection algorithm implemented in sqlmap to perform this technique
is able to fetch each output character with at maximum seven HTTP
requests.
This is sqlmap default SQL injection technique.UNION ALL SELECT
. This techique is useful if the web application
-page passes the output of the SELECT
statement to a for
-cycle, or similar, so that each line of the query output is printed on the
-page content.
+UNION ALL SELECT
. This techique is useful if the web
+application page passes the output of the SELECT
statement to a
+for
cycle, or similar, so that each line of the query output is
+printed on the page content.
sqlmap is also able to exploit Partial UNION query SQL injection
vulnerabilities which occur when the output of the statement is not cycled
in a for construct whereas only the first entry output is displayed.
@@ -210,6 +210,15 @@ This technique is much faster if the target url is affected by because
in a single HTTP response it returns the whole query output or a entry
per each response within the page content.
This SQL injection technique is an alternative to the first one.;
) followed by the
+SQL statement to be executed. This technique is useful if to run SQL
+statements other than SELECT
like, for instance, data
+definition or data manipulation statements possibly leading
+to file system read and write access and operating system command
+execution depending on the underlying back-end database management system.It is strongly recommended to run at least once sqlmap with the @@ -241,16 +250,17 @@ database management system name if you already know it. sqlmap is also able to fingerprint the web server operating system, the web application technology and, in some circumstances, the back-end DBMS operating system. -
SELECT
statement.
+system and run your own SQL statement.
Options: --sql-query
and --sql-shell
-sqlmap implements two techniques to exploit a SQL injection vulnerability:
+sqlmap implements three techniques to exploit a SQL injection
+vulnerability:
Options: --sql-query and --sql-shell
diff --git a/doc/THANKS b/doc/THANKS
index f53a5bb5d..972b04f44 100644
--- a/doc/THANKS
+++ b/doc/THANKS
@@ -116,6 +116,10 @@ Sven Schluter