Minor update

This commit is contained in:
Miroslav Stampar 2021-01-13 11:51:19 +01:00
parent c66c9e2619
commit 3a87264926

View File

@ -57,12 +57,12 @@ Warning: SQLite3::exec(): near "": syntax error in index.php on line 19
<div style="text-align: center"><img src="images/screenshot.png"></div>
<center><span>The sqlmap project is currently searching for sponsor(s)</span></center>
<!-- <center><span>The sqlmap project is currently searching for sponsor(s)</span></center> -->
<a name="features"><h1>Features</h1></a>
<ul>
<li>Full support for <strong>MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB, Informix, MariaDB, MemSQL, TiDB, CockroachDB, HSQLDB, H2, MonetDB, Apache Derby, Amazon Redshift, Vertica, Mckoi, Presto, Altibase, MimerSQL, CrateDB, Greenplum, Drizzle, Apache Ignite, Cubrid, InterSystems Cache, IRIS, eXtremeDB and FrontBase</strong> database management systems.</li>
<li>Full support for <strong>MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB, Informix, MariaDB, MemSQL, TiDB, CockroachDB, HSQLDB, H2, MonetDB, Apache Derby, Amazon Redshift, Vertica, Mckoi, Presto, Altibase, MimerSQL, CrateDB, Greenplum, Drizzle, Apache Ignite, Cubrid, InterSystems Cache, IRIS, eXtremeDB, FrontBase, Raima Database Manager and YugabyteDB</strong> database management systems.</li>
<li>Full support for six SQL injection techniques: <strong>boolean-based blind, time-based blind, error-based, UNION query-based, stacked queries and out-of-band</strong>.</li>
<li>Support to <strong>directly connect to the database</strong> without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name.</li>
<li>Support to enumerate <strong>users, password hashes, privileges, roles, databases, tables and columns</strong>.</li>