mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-04-20 09:02:02 +03:00
Updated Usage (markdown)
This commit is contained in:
parent
2a38db1edd
commit
7c72663fe6
7
Usage.md
7
Usage.md
|
@ -1642,11 +1642,11 @@ Example against a Microsoft SQL Server target:
|
|||
|
||||
Switch: `--wizard`
|
||||
|
||||
For beginner users there is a wizard interface which uses a simple workflow with as little questions as possible. If user just uses default answers (e.g. just presses `Enter`) he should have a properly set sqlmap run environment by the end of the workflow.
|
||||
For beginner users there is a wizard interface which uses a simple workflow with as little questions as possible. If user just enters target URL and uses default answers (e.g. by pressing `Enter`) he should have a properly set sqlmap run environment by the end of the workflow.
|
||||
|
||||
Example against a Microsoft SQL Server target:
|
||||
|
||||
$ python sqlmap.py -u "http://192.168.21.129/sqlmap/mssql/iis/get_int.asp?id=1" --wizard
|
||||
$ python sqlmap.py --wizard
|
||||
|
||||
sqlmap/1.0-dev-2defc30 - automatic SQL injection and database takeover tool
|
||||
http://sqlmap.org
|
||||
|
@ -1655,6 +1655,7 @@ For beginner users there is a wizard interface which uses a simple workflow with
|
|||
|
||||
[*] starting at 11:25:26
|
||||
|
||||
Please enter full target URL (-u): http://192.168.21.129/sqlmap/mssql/iis/get_int.asp?id=1
|
||||
POST data (--data) [Enter for None]:
|
||||
Injection difficulty (--level/--risk). Please choose:
|
||||
[1] Normal (default)
|
||||
|
@ -1715,4 +1716,4 @@ For beginner users there is a wizard interface which uses a simple workflow with
|
|||
current database: 'testdb'
|
||||
current user is DBA: True
|
||||
|
||||
[*] shutting down at 11:25:52
|
||||
[*] shutting down at 11:25:52
|
Loading…
Reference in New Issue
Block a user