mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-25 11:03:47 +03:00
some syntax corrections
This commit is contained in:
parent
5c92fad5dc
commit
4e6af8d6c9
212
doc/README.sgml
212
doc/README.sgml
|
@ -1081,7 +1081,7 @@ Option: <tt>--referer</tt>
|
|||
|
||||
<p>
|
||||
It is possible to fake the HTTP <tt>Referer</tt> header value with this
|
||||
option. By default no HTTP <tt>Referer</tt> heder is sent in HTTP
|
||||
option. By default no HTTP <tt>Referer</tt> header is sent in HTTP
|
||||
requests.
|
||||
|
||||
<p>
|
||||
|
@ -1204,7 +1204,7 @@ Option: <tt>--headers</tt>
|
|||
|
||||
<p>
|
||||
It is possible to provide extra HTTP headers by providing <tt>--headers</tt>
|
||||
options. Each header must be separated by a "\n" string and it's much easier
|
||||
options. Each header must be separated by a newline and it's much easier
|
||||
to provide them from the configuration INI file. Have a look at the sample
|
||||
<tt>sqlmap.conf</tt> file.
|
||||
|
||||
|
@ -1483,8 +1483,8 @@ Option: <tt>--dbms</tt>
|
|||
|
||||
<p>
|
||||
By default sqlmap automatically detects the web application's back-end
|
||||
database manangement system.
|
||||
At the moment the fully supported database management system are four:
|
||||
database management system.
|
||||
At the moment, fully supported database management systems are:
|
||||
|
||||
<itemize>
|
||||
<item>MySQL
|
||||
|
@ -1497,9 +1497,9 @@ At the moment the fully supported database management system are four:
|
|||
It is possible to force the DBMS name if you already know it so that sqlmap
|
||||
will skip the fingerprint with an exception for MySQL and Microsoft SQL
|
||||
Server to only identify the version.
|
||||
To avoid also this check you can provide instead <tt>MySQL VERSION</tt> or
|
||||
<tt>Microsoft SQL Server VERSION</tt> where version is a valid version for
|
||||
the DBMS, for instance <tt>5.0</tt> for MySQL and <tt>2005</tt> for
|
||||
To avoid also this check you can provide instead <tt>MySQL <version></tt> or
|
||||
<tt>Microsoft SQL Server <version></tt>, where <version> is a valid version for
|
||||
the DBMS; for instance <tt>5.0</tt> for MySQL and <tt>2005</tt> for
|
||||
Microsoft SQL Server.
|
||||
|
||||
Example on a <bf>PostgreSQL 8.3.5</bf> target:
|
||||
|
@ -1535,7 +1535,7 @@ Option: <tt>--os</tt>
|
|||
|
||||
<p>
|
||||
By default sqlmap automatically detects the web application's back-end
|
||||
database manangement system underlying operating system when requested by
|
||||
database management system underlying operating system when requested by
|
||||
any other functionality.
|
||||
At the moment the fully supported operating systems are two:
|
||||
|
||||
|
@ -1797,8 +1797,8 @@ As you can see, when one of these options is specified, sqlmap skips the
|
|||
URL stability test.
|
||||
|
||||
<p>
|
||||
<bf>Consider one of these options a must when you are dealing with a page
|
||||
which content that changes itself at each refresh without modifying the
|
||||
<bf>Consider one of these options a MUST when dealing with a page
|
||||
with content that changes itself at each refresh without modifying the
|
||||
user's input</bf>.
|
||||
|
||||
|
||||
|
@ -1808,7 +1808,7 @@ user's input</bf>.
|
|||
Options: <tt>--excl-str</tt> and <tt>--excl-reg</tt>
|
||||
|
||||
<p>
|
||||
Another way to get around the dynamicity issue above explained is to exclude
|
||||
Another way to get around the dynamicity issue explained above is to exclude
|
||||
the dynamic part from the page content before processing it.
|
||||
|
||||
<p>
|
||||
|
@ -1979,8 +1979,8 @@ time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';
|
|||
|
||||
<p>
|
||||
It is also possible to set the seconds to delay the response by providing
|
||||
the <tt>--time-sec</tt> option followed by an integer. By default it delays
|
||||
five seconds.
|
||||
the <tt>--time-sec</tt> option followed by an integer. By default delay
|
||||
is set to five seconds.
|
||||
|
||||
|
||||
<sect2>Test for UNION query SQL injection
|
||||
|
@ -2215,12 +2215,12 @@ available databases [4]:
|
|||
|
||||
<p>
|
||||
As you can see, sqlmap identified that the parameter is affected by a
|
||||
partial inband SQL injection, consequently counted the number of query
|
||||
output entries and retrieved once per time by forcing the parameter
|
||||
partial inband SQL injection. Consequently, it counted the number of query
|
||||
output entries and retrieved them once per time. It forces the parameter
|
||||
(<tt>id</tt>) value <tt>1</tt> to its negative value <tt>-1</tt> so that
|
||||
it does not returns, presumibly, any output leaving our own <tt>UNION ALL
|
||||
SELECT</tt> statement to produce one entry at a time and display it in the
|
||||
page content.
|
||||
it does not return, presumibly, any output. That leaves our own <tt>UNION ALL
|
||||
SELECT</tt> statement to produce one entry at a time and display only it in
|
||||
the page content.
|
||||
|
||||
|
||||
<sect1>Fingerprint
|
||||
|
@ -2345,7 +2345,7 @@ back-end DBMS: active fingerprint: PostgreSQL >= 8.3.0
|
|||
</verb></tscreen>
|
||||
|
||||
<p>
|
||||
As you can see from this last example, sqlmap first tested for MySQL,
|
||||
As you can see from the last example, sqlmap first tested for MySQL,
|
||||
then for Oracle, then for PostgreSQL since the user did not forced the
|
||||
back-end database management system name with option <tt>--dbms</tt>.
|
||||
|
||||
|
@ -2424,7 +2424,7 @@ back-end DBMS: active fingerprint: MySQL >= 5.0.38 and < 5.1.2
|
|||
</verb></tscreen>
|
||||
|
||||
<p>
|
||||
As you can see, sqlmap was able to fingerprint also the back-end DBMS
|
||||
As you can see, sqlmap was also able to fingerprint the back-end DBMS
|
||||
operating system by parsing the DBMS banner value.
|
||||
|
||||
<p>
|
||||
|
@ -2501,12 +2501,12 @@ name="SQLSecurity.com site"> and outputs it to the XML versions file.
|
|||
Option: <tt>-b</tt> or <tt>--banner</tt>
|
||||
|
||||
<p>
|
||||
Most of the modern database management systems have a function or an
|
||||
environment variable which returns details on the database managemet
|
||||
system version. Sometimes also the operating system where the daemon has
|
||||
been compiled on, the operating system architecture, its service pack.
|
||||
Usually this function is <tt>version()</tt> or the <tt>@@version</tt>
|
||||
environment variable.
|
||||
Most of the modern database management systems have a function and/or
|
||||
an environment variable which returns details on the database management
|
||||
system version. Also, sometimes it returns the operating system version
|
||||
where the daemon has been compiled on, the operating system architecture,
|
||||
and its service pack. Usually the function is <tt>version()</tt> and the
|
||||
environment variable <tt>@@version</tt>.
|
||||
|
||||
<p>
|
||||
Example on a <bf>MySQL 5.0.67</bf> target:
|
||||
|
@ -2611,7 +2611,7 @@ current database: 'master'
|
|||
Option: <tt>--is-dba</tt>
|
||||
|
||||
<p>
|
||||
It is possible to detect if the database management system session user is
|
||||
It is possible to detect if the current database management system session user is
|
||||
a database administrator.
|
||||
|
||||
<p>
|
||||
|
@ -2849,8 +2849,8 @@ database management system users privileges:
|
|||
|
||||
<p>
|
||||
As you can see, depending on the user privileges, sqlmap identifies if the
|
||||
user is a database management system administrator and show next to the
|
||||
username this information.
|
||||
user is a database management system administrator and shows this information
|
||||
next to the username.
|
||||
|
||||
<p>
|
||||
If you provide <tt>CU</tt> as username it will consider it as an alias for
|
||||
|
@ -2941,7 +2941,7 @@ Options: <tt>--tables</tt> and <tt>-D</tt>
|
|||
|
||||
<p>
|
||||
It is possible to enumerate the list of tables for all database
|
||||
manangement system's databases.
|
||||
management system's databases.
|
||||
|
||||
<p>
|
||||
Example on a <bf>MySQL 5.0.67</bf> target:
|
||||
|
@ -3041,9 +3041,9 @@ Database: USERS
|
|||
|
||||
<p>
|
||||
Note that on Oracle you have to provide the <tt>TABLESPACE_NAME</tt>
|
||||
instead of the database name, in my example that is <tt>users</tt> to
|
||||
retrieve all tables owned by an Oracle database management system
|
||||
user.
|
||||
instead of the database name. In provided example <tt>users</tt> was
|
||||
used to retrieve all tables owned by an Oracle database management
|
||||
system user.
|
||||
|
||||
|
||||
<sect2>Database table columns
|
||||
|
@ -3054,7 +3054,7 @@ Options: <tt>--columns</tt>, <tt>-T</tt> and <tt>-D</tt>
|
|||
<p>
|
||||
It is possible to enumerate the list of columns for a specific database
|
||||
table.
|
||||
This functionality depends on the <tt>-T</tt> to specify the table name
|
||||
This functionality depends on the option <tt>-T</tt> to specify the table name
|
||||
and optionally on <tt>-D</tt> to specify the database name.
|
||||
|
||||
<p>
|
||||
|
@ -3128,8 +3128,8 @@ Table: users
|
|||
|
||||
<p>
|
||||
Note that on PostgreSQL you have to provide <tt>public</tt> or the
|
||||
name of a system database because it is not possible to enumerate other
|
||||
databases tables, only the tables under the schema that the web
|
||||
name of a system database. That's because it is not possible to enumerate
|
||||
other databases tables, only the tables under the schema that the web
|
||||
application's user is connected to, which is always <tt>public</tt>.
|
||||
|
||||
<p>
|
||||
|
@ -3180,7 +3180,7 @@ Options: <tt>--dump</tt>, <tt>-C</tt>, <tt>-T</tt>, <tt>-D</tt>,
|
|||
|
||||
<p>
|
||||
It is possible to dump the entries for a specific database table.
|
||||
This functionality depends on the <tt>-T</tt> to specify the table name
|
||||
This functionality depends on the option <tt>-T</tt> to specify the table name
|
||||
and optionally on <tt>-D</tt> to specify the database name.
|
||||
If the database name is not specified, the current database name is used.
|
||||
|
||||
|
@ -3249,7 +3249,7 @@ Table: users
|
|||
|
||||
<p>
|
||||
sqlmap also stores for each table the dumped entries in a CSV format file.
|
||||
You can see the absolute path where it stored the dumped tables entries
|
||||
You can see the absolute path where sqlmap stores the dumped tables entries
|
||||
by providing a verbosity level greater than or equal to 1.
|
||||
|
||||
<p>
|
||||
|
@ -3315,7 +3315,7 @@ Table: users
|
|||
</verb></tscreen>
|
||||
|
||||
<p>
|
||||
As you can see, sqlmap is very flexible: you can leave it automatically
|
||||
As you can see, sqlmap is very flexible. You can leave it to automatically
|
||||
enumerate the whole database table up to a single column of a specific
|
||||
table entry.
|
||||
|
||||
|
@ -3395,7 +3395,7 @@ Table: CHARACTER_SETS
|
|||
|
||||
<p>
|
||||
You can also provide the <tt>--exclude-sysdbs</tt> option to exclude all
|
||||
system databases so that sqlmap will only dump entries of users' databases
|
||||
system databases. In that case sqlmap will only dump entries of users' databases
|
||||
tables.
|
||||
|
||||
<p>
|
||||
|
@ -3455,13 +3455,13 @@ Options: <tt>--sql-query</tt> and <tt>--sql-shell</tt>
|
|||
<p>
|
||||
The SQL query and the SQL shell features makes the user able to run
|
||||
custom SQL statement on the web application's back-end database management.
|
||||
sqlmap automatically recognize the type of SQL statement provided and
|
||||
choose which SQL injection technique to use to execute it: if it is a
|
||||
<tt>SELECT</tt> statement it will retrieve its output through the blind SQL
|
||||
injection or UNION query SQL injection technique depending on the user's
|
||||
options, otherwise it will execute the query through the stacked query
|
||||
SQL injection technique if the web application supports multiple
|
||||
statements on the back-end database management system.
|
||||
sqlmap recognizes the type of SQL statement provided and automatically
|
||||
chooses which SQL injection technique to use for it to be able to execute it.
|
||||
If it is a <tt>SELECT</tt> statement it will retrieve its output through
|
||||
the blind SQL injection or UNION query SQL injection technique depending
|
||||
on the user's options. Otherwise it will execute the query through the
|
||||
stacked query SQL injection technique if the web application supports
|
||||
multiple statements on the back-end database management system.
|
||||
|
||||
<p>
|
||||
Examples on a <bf>Microsoft SQL Server 2000 Service Pack 0</bf> target:
|
||||
|
@ -3497,10 +3497,10 @@ SELECT 'foo', 'bar': 'foo, bar'
|
|||
</verb></tscreen>
|
||||
|
||||
<p>
|
||||
As you can see from this last example, sqlmap splits the query in two
|
||||
different <tt>SELECT</tt> statement to be able to retrieve the output even
|
||||
when using the blind SQL injection technique.
|
||||
Otherwise in UNION query SQL injection technique it only performs a single
|
||||
As you can see from the last example, sqlmap splits provided query into two
|
||||
different <tt>SELECT</tt> statements for it to be able to retrieve the
|
||||
output even in case when using the blind SQL injection technique.
|
||||
Otherwise, in UNION query SQL injection technique it only performs a single
|
||||
HTTP request to get the user's query output:
|
||||
|
||||
<tscreen><verb>
|
||||
|
@ -3527,11 +3527,11 @@ SELECT 'foo', 'bar' [1]:
|
|||
|
||||
<p>
|
||||
If your <tt>SELECT</tt> statement contains a <tt>FROM</tt> clause, sqlmap
|
||||
asks the user if such statement can return multiple entries and in such
|
||||
asks the user if such statement can return multiple entries. In that
|
||||
case the tool knows how to unpack the query correctly to retrieve its
|
||||
whole output entry per entry when going through blind SQL injection
|
||||
technique. Through UNION query SQL injection it retrieved the whole output
|
||||
in a single response.
|
||||
whole output, entry per entry, when going through blind SQL injection
|
||||
technique. In provided example, UNION query SQL injection it retrieved
|
||||
the whole output in a single response.
|
||||
|
||||
<p>
|
||||
Example on a <bf>PostgreSQL 8.3.5</bf> target:
|
||||
|
@ -3553,13 +3553,13 @@ SELECT usename FROM pg_user [2]:
|
|||
</verb></tscreen>
|
||||
|
||||
<p>
|
||||
As you can see from the last example, sqlmap counted the number of entries
|
||||
for your query and asks how many entries you want to dump.
|
||||
Otherwise if you specify also the <tt>LIMIT</tt>, or similar, clause
|
||||
sqlmap will not ask anything, it just unpacks the query and return its
|
||||
output entry per entry when going through blind SQL injection technique.
|
||||
Through UNION query SQL injection it retrieved the whole output in a
|
||||
single response.
|
||||
As you can see from the last example, sqlmap counts the number of entries
|
||||
for a given query and asks for number of entries to dump.
|
||||
Otherwise, if the <tt>LIMIT</tt> is also specified, or similar clause,
|
||||
sqlmap will not ask for anything. It will just unpack the query and return its
|
||||
output, entry per entry, when going through blind SQL injection technique.
|
||||
In a given example, sqlmap used UNION query SQL injection to retrieve the
|
||||
whole output in a single response.
|
||||
|
||||
<p>
|
||||
Example on a <bf>MySQL 5.0.67</bf> target:
|
||||
|
@ -3606,10 +3606,10 @@ SELECT host, password FROM mysql.user LIMIT 1, 3 [3]:
|
|||
</verb></tscreen>
|
||||
|
||||
<p>
|
||||
The SQL shell option gives you access to run your own SQL statement
|
||||
interactively, like a SQL console logged to the back-end database
|
||||
The SQL shell option gives you an access to run your own SQL statement
|
||||
interactively, like a SQL console connected to the back-end database
|
||||
management system.
|
||||
This feature has TAB completion and history support.
|
||||
Note that this feature provides TAB completion and history support.
|
||||
|
||||
<p>
|
||||
Example of history support on a <bf>PostgreSQL 8.3.5</bf> target:
|
||||
|
@ -3682,7 +3682,7 @@ sql> SELECT
|
|||
<p>
|
||||
As you can see the TAB functionality shows the queries defined for the
|
||||
back-end database management system in sqlmap XML queries file, but you
|
||||
can run whatever <tt>SELECT</tt> statement that you want.
|
||||
can run whatever <tt>SELECT</tt> statement you want.
|
||||
|
||||
<p>
|
||||
Example of asterisk expansion on a <bf>MySQL 5.0.67</bf> target:
|
||||
|
@ -3776,9 +3776,9 @@ SELECT * FROM test.users [3]:
|
|||
</verb></tscreen>
|
||||
|
||||
<p>
|
||||
As you can see in this last example, if the <tt>SELECT</tt> statement has
|
||||
an asterisk instead of the column(s) name, sqlmap first retrieves the
|
||||
column names of the table then asks if the query can return multiple
|
||||
As you can see from the example, if the <tt>SELECT</tt> statement has
|
||||
an asterisk instead of the column(s) name, sqlmap first retrieves all
|
||||
column names of the current table, asks if the query can return multiple
|
||||
entries and goes on.
|
||||
|
||||
<p>
|
||||
|
@ -3818,10 +3818,10 @@ SELECT COUNT(name) FROM users: '5'
|
|||
</verb></tscreen>
|
||||
|
||||
<p>
|
||||
As you can see from this last example, when the user provides a SQL
|
||||
statement other than <tt>SELECT</tt>, sqlmap recognizes it, tests if the
|
||||
web application supports stacked queries and in case it does, it executes
|
||||
the provided SQL statement in a multiple statement.
|
||||
As you can see from the example, when the user provides a SQL statement
|
||||
other than <tt>SELECT</tt>, sqlmap recognizes it, tests if the web
|
||||
application supports stacked queries and in case it does, it executes
|
||||
the provided SQL statement in a multiple statement mode.
|
||||
|
||||
<p>
|
||||
Beware that some web application technologies do not support stacked
|
||||
|
@ -3840,14 +3840,14 @@ Option: <tt>--read-file</tt>
|
|||
<p>
|
||||
It is possible to retrieve the content of files from the underlying file
|
||||
system when the back-end database management system is either MySQL,
|
||||
PostgreSQL or Microsoft SQL Server and the session user has the needed
|
||||
PostgreSQL or Microsoft SQL Server, and the session user has the needed
|
||||
privileges to abuse database specific functionalities and architectural
|
||||
weaknesses.
|
||||
The file specified can be either a text or a binary file, sqlmap will
|
||||
The file specified can be either a text or a binary file. sqlmap will
|
||||
handle either cases automatically.
|
||||
|
||||
<p>
|
||||
These techniques are detailed on the white paper
|
||||
These techniques are detailed in white paper
|
||||
<htmlurl url="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf" name="Advanced SQL injection to operating system full control">.
|
||||
|
||||
<p>
|
||||
|
@ -3963,13 +3963,13 @@ Options: <tt>--write-file</tt> and <tt>--dest-file</tt>
|
|||
<p>
|
||||
It is possible to upload a local file to the underlying file system when
|
||||
the back-end database management system is either MySQL, PostgreSQL or
|
||||
Microsoft SQL Server and the session user has the needed privileges to
|
||||
Microsoft SQL Server, and the session user has the needed privileges to
|
||||
abuse database specific functionalities and architectural weaknesses.
|
||||
The file specified can be either a text or a binary file, sqlmap will
|
||||
The file specified can be either a text or a binary file. sqlmap will
|
||||
handle either cases automatically.
|
||||
|
||||
<p>
|
||||
These techniques are detailed on the white paper
|
||||
These techniques are detailed in white paper
|
||||
<htmlurl url="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf" name="Advanced SQL injection to operating system full control">.
|
||||
|
||||
<p>
|
||||
|
@ -4017,7 +4017,7 @@ Options: <tt>--os-cmd</tt> and <tt>--os-shell</tt>
|
|||
<p>
|
||||
It is possible to execute arbitrary commands on the underlying operating
|
||||
system when the back-end database management system is either MySQL,
|
||||
PostgreSQL or Microsoft SQL Server and the session user has the needed
|
||||
PostgreSQL or Microsoft SQL Server, and the session user has the needed
|
||||
privileges to abuse database specific functionalities and architectural
|
||||
weaknesses.
|
||||
|
||||
|
@ -4035,11 +4035,11 @@ sqlmap creates it from scratch.
|
|||
<p>
|
||||
If the user wants to retrieve the command standard output, sqlmap will use
|
||||
one of the enumeration SQL injection techniques (blind or inband) to
|
||||
retrieve it, viceversa sqlmap will use the stacked query SQL injection
|
||||
technique to execute the command without returning anything to the user.
|
||||
retrieve it, or in case of stacked query SQL injection technique
|
||||
sqlmap will execute the command without returning anything to the user.
|
||||
|
||||
<p>
|
||||
These techniques are detailed on the white paper
|
||||
These techniques are detailed in white paper
|
||||
<htmlurl url="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf" name="Advanced SQL injection to operating system full control">.
|
||||
|
||||
<p>
|
||||
|
@ -4120,7 +4120,7 @@ nt authority\network service
|
|||
<p>
|
||||
It is also possible to simulate a real shell where you can type as many
|
||||
arbitrary commands as you wish. The option is <tt>--os-shell</tt> and has
|
||||
the same TAB completion and history functionalities implemented for
|
||||
the same TAB completion and history functionalities as provided by
|
||||
<tt>--sql-shell</tt>.
|
||||
|
||||
<p>
|
||||
|
@ -4355,7 +4355,7 @@ exploited SQL injection as a stepping stone. This is implemented for MySQL,
|
|||
PostgreSQL and Microsoft SQL Server.
|
||||
sqlmap relies on the <htmlurl url="http://metasploit.com/framework"
|
||||
name="Metasploit"> to perform this attack, so you need to have it already
|
||||
on your system: it's free and can be downloaded from the homepage. It is
|
||||
on your system - it's free and can be downloaded from the homepage. It is
|
||||
required to use Metasploit Framework version 3.3.3 or above.
|
||||
|
||||
<p>
|
||||
|
@ -4364,7 +4364,7 @@ because Metasploit's msfconsole and msfcli are not supported on the native
|
|||
Windows Ruby interpreter.
|
||||
|
||||
<p>
|
||||
These techniques are detailed on the white paper
|
||||
These techniques are detailed in white paper
|
||||
<htmlurl url="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf" name="Advanced SQL injection to operating system full control">.
|
||||
|
||||
<p>
|
||||
|
@ -4488,10 +4488,10 @@ stand-alone exploit if the user wants so.
|
|||
<p>
|
||||
Note that this feature is not supported by sqlmap installed from the
|
||||
DEB package because it relies on Churrasco, which is not explicitly free
|
||||
software so it has not been included in the package.
|
||||
software, so it has not been included in the package.
|
||||
|
||||
<p>
|
||||
This technique is detailed on the white paper
|
||||
This technique is detailed in white paper
|
||||
<htmlurl url="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf" name="Advanced SQL injection to operating system full control">.
|
||||
|
||||
<p>
|
||||
|
@ -4611,19 +4611,19 @@ stateful channel</bf> between the attacker host and the target database
|
|||
server.
|
||||
sqlmap relies on <htmlurl url="http://metasploit.com/framework"
|
||||
name="Metasploit">'s SMB relay exploit to perform this attack, so you need
|
||||
to have it already on your system: it's free and can be downloaded from the
|
||||
to have it already on your system - it's free and can be downloaded from the
|
||||
homepage.
|
||||
You need to run sqlmap as <bf>root</bf> user if you want to perform a SMB
|
||||
relay attack because it will need to listen on a user-specified SMB TCP
|
||||
port for incoming connection attempts.
|
||||
|
||||
<p>
|
||||
Note that this feature is not supported by sqlmap running on Windows
|
||||
Note that this feature is not supported by sqlmap running on Windows platform
|
||||
because Metasploit's msfconsole and msfcli are not supported on the native
|
||||
Windows Ruby interpreter.
|
||||
|
||||
<p>
|
||||
This technique is detailed on the white paper
|
||||
This technique is detailed in white paper
|
||||
<htmlurl url="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf" name="Advanced SQL injection to operating system full control">.
|
||||
|
||||
<p>
|
||||
|
@ -4768,15 +4768,15 @@ target database server.
|
|||
sqlmap has its own exploit to trigger the vulnerability, but it relies on
|
||||
<htmlurl url="http://metasploit.com/framework" name="Metasploit"> to
|
||||
generate the shellcode used within the exploit, so you need to have it
|
||||
already on your system: it's free and can be downloaded from the homepage.
|
||||
already on your system - it's free and can be downloaded from the homepage.
|
||||
|
||||
<p>
|
||||
Note that this feature is not supported by sqlmap running on Windows
|
||||
Note that this feature is not supported by sqlmap running on Windows platform
|
||||
because Metasploit's msfconsole and msfcli are not supported on the native
|
||||
Windows Ruby interpreter.
|
||||
|
||||
<p>
|
||||
This technique is detailed on the white paper
|
||||
This technique is detailed in white paper
|
||||
<htmlurl url="http://sqlmap.sourceforge.net/doc/BlackHat-Europe-09-Damele-A-G-Advanced-SQL-injection-whitepaper.pdf" name="Advanced SQL injection to operating system full control">.
|
||||
|
||||
<p>
|
||||
|
@ -4940,7 +4940,7 @@ database management system users [3]:
|
|||
|
||||
<p>
|
||||
As you can see, sqlmap first calculates the length of the query output,
|
||||
then estimated the time of arrival, shows the progress in percentage and
|
||||
then estimates the time of arrival, shows the progress in percentage and
|
||||
counts the number of retrieved query output characters.
|
||||
|
||||
|
||||
|
@ -4952,7 +4952,7 @@ Option: <tt>--update</tt>
|
|||
<p>
|
||||
|
||||
It is possible to update sqlmap to the latest stable version available on
|
||||
its <htmlurl url="http://sourceforge.net/projects/sqlmap/files/"
|
||||
project's <htmlurl url="http://sourceforge.net/projects/sqlmap/files/"
|
||||
name="SourceForge File List page"> by running it with the
|
||||
<tt>--update</tt> option.
|
||||
|
||||
|
@ -5011,16 +5011,16 @@ Set-Cookie: language=en-US; path=/; HttpOnly
|
|||
</verb></tscreen>
|
||||
|
||||
<p>
|
||||
As you can see, sqlmap first check if a new stable version is available,
|
||||
then in case it is, download it, unzip it and update the Microsoft SQL
|
||||
As you can see, sqlmap first checks if a new stable version is available,
|
||||
and then in case it is, downloads it, unzips it and updates the Microsoft SQL
|
||||
Server XML versions file from Chip Andrews'
|
||||
<htmlurl url="http://www.sqlsecurity.com/FAQs/SQLServerVersionDatabase/tabid/63/Default.aspx"
|
||||
name="SQLSecurity.com site">.
|
||||
|
||||
<p>
|
||||
Note that the default configuration file <tt>sqlmap.conf</tt> is backupped
|
||||
to <tt>sqlmap.conf.bak</tt> in case a new stable version is available and
|
||||
your copy is updated.
|
||||
to <tt>sqlmap.conf.bak</tt> each time a new stable version is available and
|
||||
your copy is outdated.
|
||||
|
||||
|
||||
<sect2>Save and resume all data retrieved on a session file
|
||||
|
@ -5029,7 +5029,7 @@ your copy is updated.
|
|||
Option: <tt>-s</tt>
|
||||
|
||||
<p>
|
||||
It is possible to log all queries and their output on a text file while
|
||||
It is possible to log all queries and their output into a text file while
|
||||
performing whatever request, both in blind SQL injection and in inband SQL
|
||||
injection.
|
||||
This is useful if you stop the injection and resume it after some time.
|
||||
|
@ -5258,9 +5258,9 @@ banner: 'PostgreSQL 8.3.5 on i486-pc-linux-gnu, compiled by GCC gcc-4.3.real
|
|||
Option: <tt>--batch</tt>
|
||||
|
||||
<p>
|
||||
If you want sqlmap to run as a batch tool, without interacting with you in
|
||||
case of a choice has to be done, you can force it by using <tt>--batch</tt>
|
||||
option than letting sqlmap go for a default behaviour.
|
||||
If you want sqlmap to run as a batch tool, without any users interaction
|
||||
when a choice has to be done, you can force it by using <tt>--batch</tt>
|
||||
option, and leave sqlmap to go for a default behaviour.
|
||||
|
||||
<p>
|
||||
Example on a <bf>MySQL 5.0.67</bf> target:
|
||||
|
@ -5297,8 +5297,8 @@ back-end DBMS: MySQL >= 5.0.0
|
|||
</verb></tscreen>
|
||||
|
||||
<p>
|
||||
As you can see, sqlmap choosed automatically to injection on the first
|
||||
vulnerable parameter which is the default behaviour.
|
||||
As you can see, sqlmap by default automatically chooses to inject payload
|
||||
to the first vulnerable parameter.
|
||||
|
||||
|
||||
<sect2>Clean up the DBMS by sqlmap specific UDF and tables
|
||||
|
|
Loading…
Reference in New Issue
Block a user