mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-10-31 16:07:55 +03:00 
			
		
		
		
	minor update
This commit is contained in:
		
							parent
							
								
									1f1a442f89
								
							
						
					
					
						commit
						84028316ab
					
				
							
								
								
									
										4
									
								
								FAQ.md
									
									
									
									
									
								
							
							
						
						
									
										4
									
								
								FAQ.md
									
									
									
									
									
								
							|  | @ -85,8 +85,8 @@ Question(s): | |||
| 
 | ||||
| ## How to use sqlmap with `mod_rewrite` enabled? | ||||
| 
 | ||||
| Just put `*` to the place where sqlmap should check for injections in URI itself. For example, `./sqlmap.py -u "www.site.com/id1/1*/id2/2"` sqlmap will try to inject the payloads just at that place marked with `*` character. | ||||
| This feature also applies to POST data. | ||||
| Append an asterisk, `*`, to the place where sqlmap should check for injections in URI itself. For example, `./sqlmap.py -u "http://target.tld/id1/1*/id2/2"`, sqlmap will inject its payloads at that place marked with `*` character. | ||||
| This feature also applies to POST data. Multiple injection points are supported and will be assessed sequentially. | ||||
| 
 | ||||
| Question(s): | ||||
| [#1](http://thread.gmane.org/gmane.comp.security.sqlmap/731) | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue
	
	Block a user