mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-11-04 01:47:37 +03:00 
			
		
		
		
	Update of docu
This commit is contained in:
		
							parent
							
								
									63cf848cd3
								
							
						
					
					
						commit
						8f2b972cfa
					
				
							
								
								
									
										21
									
								
								Usage.md
									
									
									
									
									
								
							
							
						
						
									
										21
									
								
								Usage.md
									
									
									
									
									
								
							| 
						 | 
				
			
			@ -1564,6 +1564,27 @@ If you want sqlmap to run as a batch tool, without any user's interaction  when
 | 
			
		|||
 | 
			
		||||
## Miscellaneous
 | 
			
		||||
 | 
			
		||||
### Set answers for questions
 | 
			
		||||
 | 
			
		||||
Option: `--answers`
 | 
			
		||||
 | 
			
		||||
In case that user wants to automatically set up answers for questions, even if `--batch` is used, using this option he can do it by providing any part of question together with answer after an equal sign. Also, answers for different question can be splitted with delimiter character `;`.
 | 
			
		||||
 | 
			
		||||
Example against a MySQL target:
 | 
			
		||||
 | 
			
		||||
    $ python sqlmap.py -u "http://192.168.22.128/sqlmap/mysql/get_int.php?id=1"--technique=E --answers="extending=N" --batch
 | 
			
		||||
    [...]
 | 
			
		||||
    [21:58:56] [INFO] testing for SQL injection on GET parameter 'id'
 | 
			
		||||
    heuristic (parsing) test showed that the back-end DBMS could be 'MySQL'. Do you want to skip test payloads specific for other DBMSes? [Y/n] Y
 | 
			
		||||
    [21:58:56] [INFO] do you want to include all tests for 'MySQL' extending provided level (1) and risk (1)? [Y/n] N
 | 
			
		||||
    [...]
 | 
			
		||||
 | 
			
		||||
### Make a beep sound when SQL injection is found
 | 
			
		||||
 | 
			
		||||
Switch: `--beep`
 | 
			
		||||
 | 
			
		||||
In case that user uses switch `--beep` he'll be warned with a beep sound immediately when SQL injection is found. This is especially useful when there is a large bulk list (option `-m`) of target URLs to be tested.
 | 
			
		||||
 | 
			
		||||
### Cleanup the DBMS from sqlmap specific UDF(s) and table(s)
 | 
			
		||||
 | 
			
		||||
Switch: `--cleanup`
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue
	
	Block a user