diff --git a/lib/core/optiondict.py b/lib/core/optiondict.py index 08787ed4d..d2034ae43 100644 --- a/lib/core/optiondict.py +++ b/lib/core/optiondict.py @@ -86,7 +86,8 @@ optDict = { "tech": "string", "timeSec": "integer", "uCols": "string", - "uChar": "string" + "uChar": "string", + "dnsDomain": "string" }, "Fingerprint": { diff --git a/lib/parse/cmdline.py b/lib/parse/cmdline.py index 26b999e3f..7f974d74e 100644 --- a/lib/parse/cmdline.py +++ b/lib/parse/cmdline.py @@ -272,6 +272,9 @@ def cmdLineParser(): techniques.add_option("--union-char", dest="uChar", help="Character to use for bruteforcing number of columns") + techniques.add_option("--dns-domain", dest="dnsDomain", + help="Domain name used for DNS exfiltration attack") + # Fingerprint options fingerprint = OptionGroup(parser, "Fingerprint") @@ -641,9 +644,6 @@ def cmdLineParser(): parser.add_option("--test-filter", dest="testFilter", help=SUPPRESS_HELP) - parser.add_option("--dns-domain", dest="dnsDomain", - help=SUPPRESS_HELP) - parser.add_option_group(target) parser.add_option_group(request) parser.add_option_group(optimization) diff --git a/sqlmap.conf b/sqlmap.conf index 779a8d91b..dd12c0c27 100644 --- a/sqlmap.conf +++ b/sqlmap.conf @@ -297,6 +297,10 @@ uCols = # Example: NULL uChar = +# Domain name used for DNS exfiltration attack +# Valid: string +dnsDomain = + [Fingerprint]