mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-10-31 07:57:47 +03:00 
			
		
		
		
	minor update
This commit is contained in:
		
							parent
							
								
									c9aac5b5fe
								
							
						
					
					
						commit
						676bae5302
					
				|  | @ -4,7 +4,7 @@ Features implemented in sqlmap include: | ||||||
| 
 | 
 | ||||||
| ## Generic features | ## Generic features | ||||||
| 
 | 
 | ||||||
| * Full support for **MySQL**, **Oracle**, **PostgreSQL**, **Microsoft SQL Server**, **Microsoft Access**, **SQLite**, **Firebird**, **Sybase** and **SAP MaxDB** database management systems. | * Full support for **MySQL**, **Oracle**, **PostgreSQL**, **Microsoft SQL Server**, **Microsoft Access**, **IBM DB2**, **SQLite**, **Firebird**, **Sybase** and **SAP MaxDB** database management systems. | ||||||
| * Full support for five SQL injection techniques: **boolean-based blind**, **time-based blind**, **error-based**, **UNION query** and **stacked queries**. | * Full support for five SQL injection techniques: **boolean-based blind**, **time-based blind**, **error-based**, **UNION query** and **stacked queries**. | ||||||
| * Support to **directly connect to the database** without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name. | * Support to **directly connect to the database** without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name. | ||||||
| * It is possible to provide a single target URL, get the list of targets from [Burp proxy](http://portswigger.net/suite/) or [WebScarab proxy](http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project) requests log files, get the whole HTTP request from a text file or get the list of targets by providing sqlmap with a Google dork which queries [Google](http://www.google.com) search engine and parses its results page. You can also define a regular-expression based scope that is used to identify which of the parsed addresses to test. | * It is possible to provide a single target URL, get the list of targets from [Burp proxy](http://portswigger.net/suite/) or [WebScarab proxy](http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project) requests log files, get the whole HTTP request from a text file or get the list of targets by providing sqlmap with a Google dork which queries [Google](http://www.google.com) search engine and parses its results page. You can also define a regular-expression based scope that is used to identify which of the parsed addresses to test. | ||||||
|  | @ -34,7 +34,7 @@ Features implemented in sqlmap include: | ||||||
| [functions output comparison](http://bernardodamele.blogspot.com/2007/07/more-on-database-management-system.html) and [specific features](http://bernardodamele.blogspot.com/2007/07/more-on-database-management-system.html) such as MySQL comment injection. It is also possible to force the back-end database management system name if you already know it. | [functions output comparison](http://bernardodamele.blogspot.com/2007/07/more-on-database-management-system.html) and [specific features](http://bernardodamele.blogspot.com/2007/07/more-on-database-management-system.html) such as MySQL comment injection. It is also possible to force the back-end database management system name if you already know it. | ||||||
| * Basic web server software and web application technology fingerprint. | * Basic web server software and web application technology fingerprint. | ||||||
| * Support to retrieve the DBMS **banner**, **session user** and **current database** information. The tool can also check if the session user is a **database administrator** (DBA). | * Support to retrieve the DBMS **banner**, **session user** and **current database** information. The tool can also check if the session user is a **database administrator** (DBA). | ||||||
| * Support to enumerate **database users**, **users' password hashes**, **users' privileges**, **users' roles**, **databases**, **tables** and **columns**. | * Support to enumerate **users, password hashes, privileges, roles, databases, tables and columns**. | ||||||
| * Automatic recognition of password hashes format and support to **crack them with a dictionary-based attack**. | * Automatic recognition of password hashes format and support to **crack them with a dictionary-based attack**. | ||||||
| * Support to **brute-force tables and columns name**. This is useful when the session user has no read access over the system table containing schema information or when the database management system does | * Support to **brute-force tables and columns name**. This is useful when the session user has no read access over the system table containing schema information or when the database management system does | ||||||
| not store this information anywhere (e.g. MySQL < 5.0). | not store this information anywhere (e.g. MySQL < 5.0). | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue
	
	Block a user