From 84028316ab21cef5d1737de7977dd2352bc7ae55 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Mon, 16 Jul 2012 11:59:40 +0100 Subject: [PATCH] minor update --- FAQ.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/FAQ.md b/FAQ.md index cd33ed874..bc9edc201 100644 --- a/FAQ.md +++ b/FAQ.md @@ -85,8 +85,8 @@ Question(s): ## How to use sqlmap with `mod_rewrite` enabled? -Just put `*` to the place where sqlmap should check for injections in URI itself. For example, `./sqlmap.py -u "www.site.com/id1/1*/id2/2"` sqlmap will try to inject the payloads just at that place marked with `*` character. -This feature also applies to POST data. +Append an asterisk, `*`, to the place where sqlmap should check for injections in URI itself. For example, `./sqlmap.py -u "http://target.tld/id1/1*/id2/2"`, sqlmap will inject its payloads at that place marked with `*` character. +This feature also applies to POST data. Multiple injection points are supported and will be assessed sequentially. Question(s): [#1](http://thread.gmane.org/gmane.comp.security.sqlmap/731)