diff --git a/doc/README.html b/doc/README.html index 0440a5959..182685701 100644 --- a/doc/README.html +++ b/doc/README.html @@ -236,6 +236,11 @@ and Microsoft SQL Server back-end database management systems. Besides these four database management systems software. sqlmap can also identify Microsoft Access, DB2, Informix, Sybase and Interbase. +
  • Full support for three SQL injection techniques: inferential +blind SQL injection, UNION query (inband) SQL injection and +stacked queries (multiple statements) support. sqlmap can also +test for time based blind SQL injection. +
  • Extensive back-end database management system fingerprint based upon inband error messages, @@ -247,11 +252,6 @@ database management system name if you already know it. sqlmap is also able to fingerprint the web server operating system, the web application technology and, in some circumstances, the back-end DBMS operating system.
  • -
  • Full support for three SQL injection techniques: inferential -blind SQL injection, UNION query (inband) SQL injection and -stacked queries (multiple statements) support. sqlmap can also -test for time based blind SQL injection. -
  • Options to retrieve on all four back-end database management system banner, current user, current database, enumerate users, users password hashes, users @@ -313,6 +313,8 @@ randomly selected from a text file. there exist six levels. The default level is 1 in which information, warnings, errors and tracebacks, if they occur, will be shown.
  • +
  • Granularity in the user's options. +
  • Estimated time of arrival support for each query, updated in real time while fetching the information to give to the user an overview on how long it will take to retrieve the output. @@ -329,6 +331,10 @@ save command line options on a configuration INI file. Metasploit and w3af.
  • +
  • File system read and write access and operating +system command execution by providing own queries, depending on the +session user privileges and back-end DBMS. +
  • PHP setting magic_quotes_gpc bypass by encoding every query string, between single quotes, with CHAR, or similar, database management system function.
  • @@ -400,7 +406,7 @@ and $ python sqlmap.py -h sqlmap/0.6.4 coded by Bernardo Damele A. G. <bernardo.damele@gmail.com> - and Daniele Bellucci <daniele.bellucci@gmail.com> + and Daniele Bellucci <daniele.bellucci@gmail.com> Usage: sqlmap.py [options] @@ -433,7 +439,7 @@ Options: --proxy=PROXY Use a HTTP proxy to connect to the target url --threads=THREADS Maximum number of concurrent HTTP requests (default 1) --delay=DELAY Delay in seconds between each HTTP request - --timeout=TIMEOUT Seconds to wait before timeout connection (default 10) + --timeout=TIMEOUT Seconds to wait before timeout connection (default 30) Injection: These options can be used to specify which parameters to test for, @@ -456,8 +462,9 @@ Options: using the default blind SQL injection technique. --stacked-test Test for stacked queries (multiple statements) support - --time-test Test for Time based blind SQL injection + --time-test Test for time based blind SQL injection --union-test Test for UNION query (inband) SQL injection + --union-tech=UTECH Technique to test for UNION query SQL injection --union-use Use the UNION query (inband) SQL injection to retrieve the queries output. No need to go blind @@ -472,6 +479,7 @@ Options: -b, --banner Retrieve DBMS banner --current-user Retrieve DBMS current user --current-db Retrieve DBMS current database + --is-dba Detect if the DBMS current user is DBA --users Enumerate DBMS users --passwords Enumerate DBMS users password hashes (opt: -U) --privileges Enumerate DBMS users privileges (opt: -U) @@ -1878,7 +1886,7 @@ stacked queries support: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'wRcBC'=

    -

    Test for Time based blind SQL injection

    +

    Test for time based blind SQL injection

    Option: --time-test

    @@ -1954,7 +1962,7 @@ time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';

    Test for UNION query SQL injection

    -

    Option: --union-test

    +

    Options: --union-test and --union-tech

    It is possible to test if the target URL is affected by an inband SQL injection vulnerability. diff --git a/doc/README.pdf b/doc/README.pdf index 341d69685..bb3d386df 100644 Binary files a/doc/README.pdf and b/doc/README.pdf differ diff --git a/doc/README.sgml b/doc/README.sgml index 331ecef4b..12caba483 100644 --- a/doc/README.sgml +++ b/doc/README.sgml @@ -193,6 +193,11 @@ and Microsoft SQL Server back-end database management systems. Besides these four database management systems software. sqlmap can also identify Microsoft Access, DB2, Informix, Sybase and Interbase. +Full support for three SQL injection techniques: inferential +blind SQL injection, UNION query (inband) SQL injection and +stacked queries (multiple statements) support. sqlmap can also +test for time based blind SQL injection. + Extensive back-end database management system fingerprint based upon , @@ -204,11 +209,6 @@ database management system name if you already know it. sqlmap is also able to fingerprint the web server operating system, the web application technology and, in some circumstances, the back-end DBMS operating system. -Full support for three SQL injection techniques: inferential -blind SQL injection, UNION query (inband) SQL injection and -stacked queries (multiple statements) support. sqlmap can also -test for time based blind SQL injection. - Options to retrieve on all four back-end database management system banner, current user, current database, enumerate users, users password hashes, users @@ -269,6 +269,8 @@ randomly selected from a text file. there exist six levels. The default level is 1 in which information, warnings, errors and tracebacks, if they occur, will be shown. +Granularity in the user's options. + Estimated time of arrival support for each query, updated in real time while fetching the information to give to the user an overview on how long it will take to retrieve the output. @@ -285,6 +287,10 @@ save command line options on a configuration INI file. and . +File system read and write access and operating +system command execution by providing own queries, depending on the +session user privileges and back-end DBMS. + PHP setting magic_quotes_gpc bypass by encoding every query string, between single quotes, with CHAR, or similar, database management system function. @@ -355,7 +361,7 @@ and . $ python sqlmap.py -h sqlmap/0.6.4 coded by Bernardo Damele A. G. - and Daniele Bellucci + and Daniele Bellucci Usage: sqlmap.py [options] @@ -388,7 +394,7 @@ Options: --proxy=PROXY Use a HTTP proxy to connect to the target url --threads=THREADS Maximum number of concurrent HTTP requests (default 1) --delay=DELAY Delay in seconds between each HTTP request - --timeout=TIMEOUT Seconds to wait before timeout connection (default 10) + --timeout=TIMEOUT Seconds to wait before timeout connection (default 30) Injection: These options can be used to specify which parameters to test for, @@ -411,8 +417,9 @@ Options: using the default blind SQL injection technique. --stacked-test Test for stacked queries (multiple statements) support - --time-test Test for Time based blind SQL injection + --time-test Test for time based blind SQL injection --union-test Test for UNION query (inband) SQL injection + --union-tech=UTECH Technique to test for UNION query SQL injection --union-use Use the UNION query (inband) SQL injection to retrieve the queries output. No need to go blind @@ -427,6 +434,7 @@ Options: -b, --banner Retrieve DBMS banner --current-user Retrieve DBMS current user --current-db Retrieve DBMS current database + --is-dba Detect if the DBMS current user is DBA --users Enumerate DBMS users --passwords Enumerate DBMS users password hashes (opt: -U) --privileges Enumerate DBMS users privileges (opt: -U) @@ -1813,7 +1821,7 @@ stacked queries support: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'wRcBC'= -Test for Time based blind SQL injection +Test for time based blind SQL injection

    Option: --time-test @@ -1886,7 +1894,7 @@ time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5'; Test for UNION query SQL injection

    -Option: --union-test +Options: --union-test and --union-tech

    It is possible to test if the target URL is affected by an inband diff --git a/lib/parse/cmdline.py b/lib/parse/cmdline.py index 66baf4160..b80c5279f 100644 --- a/lib/parse/cmdline.py +++ b/lib/parse/cmdline.py @@ -163,7 +163,7 @@ def cmdLineParser(): techniques.add_option("--time-test", dest="timeTest", action="store_true", - help="Test for Time based blind SQL injection") + help="Test for time based blind SQL injection") techniques.add_option("--union-test", dest="unionTest", action="store_true", diff --git a/sqlmap.conf b/sqlmap.conf index b921c8946..c28253d71 100644 --- a/sqlmap.conf +++ b/sqlmap.conf @@ -133,7 +133,7 @@ eRegexp = # Valid: True or False stackedTest = False -# Test for Time based blind SQL injection. +# Test for time based blind SQL injection. # Valid: True or False timeTest = False