mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 09:36:35 +03:00
Minor layout adjustments
This commit is contained in:
parent
161590e121
commit
8f973ce574
|
@ -236,6 +236,11 @@ and <B>Microsoft SQL Server</B> back-end database management systems.
|
||||||
Besides these four database management systems software. sqlmap can also
|
Besides these four database management systems software. sqlmap can also
|
||||||
identify Microsoft Access, DB2, Informix, Sybase and Interbase.
|
identify Microsoft Access, DB2, Informix, Sybase and Interbase.
|
||||||
</LI>
|
</LI>
|
||||||
|
<LI>Full support for three SQL injection techniques: <B> inferential
|
||||||
|
blind SQL injection</B>, <B>UNION query (inband) SQL injection</B> and
|
||||||
|
<B>stacked queries (multiple statements) support</B>. sqlmap can also
|
||||||
|
test for <B>time based blind SQL injection</B>.
|
||||||
|
</LI>
|
||||||
<LI><B>Extensive back-end database management system fingerprint</B>
|
<LI><B>Extensive back-end database management system fingerprint</B>
|
||||||
based upon
|
based upon
|
||||||
<A HREF="http://bernardodamele.blogspot.com/2007/06/database-management-system-fingerprint.html">inband error messages</A>,
|
<A HREF="http://bernardodamele.blogspot.com/2007/06/database-management-system-fingerprint.html">inband error messages</A>,
|
||||||
|
@ -247,11 +252,6 @@ database management system name if you already know it. sqlmap is also able
|
||||||
to fingerprint the web server operating system, the web application
|
to fingerprint the web server operating system, the web application
|
||||||
technology and, in some circumstances, the back-end DBMS operating system.
|
technology and, in some circumstances, the back-end DBMS operating system.
|
||||||
</LI>
|
</LI>
|
||||||
<LI>Full support for three SQL injection techniques: <B> inferential
|
|
||||||
blind SQL injection</B>, <B>UNION query (inband) SQL injection</B> and
|
|
||||||
<B>stacked queries (multiple statements) support</B>. sqlmap can also
|
|
||||||
test for <B>time based blind SQL injection</B>.
|
|
||||||
</LI>
|
|
||||||
<LI>Options to retrieve on all four back-end database management system
|
<LI>Options to retrieve on all four back-end database management system
|
||||||
<B>banner</B>, <B>current user</B>, <B>current database</B>,
|
<B>banner</B>, <B>current user</B>, <B>current database</B>,
|
||||||
enumerate <B>users</B>, <B>users password hashes</B>, <B>users
|
enumerate <B>users</B>, <B>users password hashes</B>, <B>users
|
||||||
|
@ -313,6 +313,8 @@ randomly selected from a text file.
|
||||||
there exist <B>six levels</B>. The default level is <B>1</B> in which
|
there exist <B>six levels</B>. The default level is <B>1</B> in which
|
||||||
information, warnings, errors and tracebacks, if they occur, will be shown.
|
information, warnings, errors and tracebacks, if they occur, will be shown.
|
||||||
</LI>
|
</LI>
|
||||||
|
<LI>Granularity in the user's options.
|
||||||
|
</LI>
|
||||||
<LI><B>Estimated time of arrival</B> support for each query, updated
|
<LI><B>Estimated time of arrival</B> support for each query, updated
|
||||||
in real time while fetching the information to give to the user an
|
in real time while fetching the information to give to the user an
|
||||||
overview on how long it will take to retrieve the output.
|
overview on how long it will take to retrieve the output.
|
||||||
|
@ -329,6 +331,10 @@ save command line options on a configuration INI file.
|
||||||
<A HREF="http://metasploit.com/framework/">Metasploit</A> and
|
<A HREF="http://metasploit.com/framework/">Metasploit</A> and
|
||||||
<A HREF="http://w3af.sourceforge.net/">w3af</A>.
|
<A HREF="http://w3af.sourceforge.net/">w3af</A>.
|
||||||
</LI>
|
</LI>
|
||||||
|
<LI><B>File system</B> read and write access and <B>operating
|
||||||
|
system</B> command execution by providing own queries, depending on the
|
||||||
|
session user privileges and back-end DBMS.
|
||||||
|
</LI>
|
||||||
<LI><B>PHP setting <CODE>magic_quotes_gpc</CODE> bypass</B> by encoding
|
<LI><B>PHP setting <CODE>magic_quotes_gpc</CODE> bypass</B> by encoding
|
||||||
every query string, between single quotes, with <CODE>CHAR</CODE>, or similar,
|
every query string, between single quotes, with <CODE>CHAR</CODE>, or similar,
|
||||||
database management system function.</LI>
|
database management system function.</LI>
|
||||||
|
@ -400,7 +406,7 @@ and
|
||||||
$ python sqlmap.py -h
|
$ python sqlmap.py -h
|
||||||
|
|
||||||
sqlmap/0.6.4 coded by Bernardo Damele A. G. <bernardo.damele@gmail.com>
|
sqlmap/0.6.4 coded by Bernardo Damele A. G. <bernardo.damele@gmail.com>
|
||||||
and Daniele Bellucci <daniele.bellucci@gmail.com>
|
and Daniele Bellucci <daniele.bellucci@gmail.com>
|
||||||
|
|
||||||
Usage: sqlmap.py [options]
|
Usage: sqlmap.py [options]
|
||||||
|
|
||||||
|
@ -433,7 +439,7 @@ Options:
|
||||||
--proxy=PROXY Use a HTTP proxy to connect to the target url
|
--proxy=PROXY Use a HTTP proxy to connect to the target url
|
||||||
--threads=THREADS Maximum number of concurrent HTTP requests (default 1)
|
--threads=THREADS Maximum number of concurrent HTTP requests (default 1)
|
||||||
--delay=DELAY Delay in seconds between each HTTP request
|
--delay=DELAY Delay in seconds between each HTTP request
|
||||||
--timeout=TIMEOUT Seconds to wait before timeout connection (default 10)
|
--timeout=TIMEOUT Seconds to wait before timeout connection (default 30)
|
||||||
|
|
||||||
Injection:
|
Injection:
|
||||||
These options can be used to specify which parameters to test for,
|
These options can be used to specify which parameters to test for,
|
||||||
|
@ -456,8 +462,9 @@ Options:
|
||||||
using the default blind SQL injection technique.
|
using the default blind SQL injection technique.
|
||||||
|
|
||||||
--stacked-test Test for stacked queries (multiple statements) support
|
--stacked-test Test for stacked queries (multiple statements) support
|
||||||
--time-test Test for Time based blind SQL injection
|
--time-test Test for time based blind SQL injection
|
||||||
--union-test Test for UNION query (inband) SQL injection
|
--union-test Test for UNION query (inband) SQL injection
|
||||||
|
--union-tech=UTECH Technique to test for UNION query SQL injection
|
||||||
--union-use Use the UNION query (inband) SQL injection to retrieve
|
--union-use Use the UNION query (inband) SQL injection to retrieve
|
||||||
the queries output. No need to go blind
|
the queries output. No need to go blind
|
||||||
|
|
||||||
|
@ -472,6 +479,7 @@ Options:
|
||||||
-b, --banner Retrieve DBMS banner
|
-b, --banner Retrieve DBMS banner
|
||||||
--current-user Retrieve DBMS current user
|
--current-user Retrieve DBMS current user
|
||||||
--current-db Retrieve DBMS current database
|
--current-db Retrieve DBMS current database
|
||||||
|
--is-dba Detect if the DBMS current user is DBA
|
||||||
--users Enumerate DBMS users
|
--users Enumerate DBMS users
|
||||||
--passwords Enumerate DBMS users password hashes (opt: -U)
|
--passwords Enumerate DBMS users password hashes (opt: -U)
|
||||||
--privileges Enumerate DBMS users privileges (opt: -U)
|
--privileges Enumerate DBMS users privileges (opt: -U)
|
||||||
|
@ -1878,7 +1886,7 @@ stacked queries support: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'wRcBC'=
|
||||||
</P>
|
</P>
|
||||||
|
|
||||||
|
|
||||||
<H3>Test for Time based blind SQL injection</H3>
|
<H3>Test for time based blind SQL injection</H3>
|
||||||
|
|
||||||
<P>Option: <CODE>--time-test</CODE></P>
|
<P>Option: <CODE>--time-test</CODE></P>
|
||||||
|
|
||||||
|
@ -1954,7 +1962,7 @@ time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';
|
||||||
|
|
||||||
<H3>Test for UNION query SQL injection</H3>
|
<H3>Test for UNION query SQL injection</H3>
|
||||||
|
|
||||||
<P>Option: <CODE>--union-test</CODE></P>
|
<P>Options: <CODE>--union-test</CODE> and <CODE>--union-tech</CODE></P>
|
||||||
|
|
||||||
<P>It is possible to test if the target URL is affected by an <B>inband
|
<P>It is possible to test if the target URL is affected by an <B>inband
|
||||||
SQL injection</B> vulnerability.
|
SQL injection</B> vulnerability.
|
||||||
|
|
BIN
doc/README.pdf
BIN
doc/README.pdf
Binary file not shown.
|
@ -193,6 +193,11 @@ and <bf>Microsoft SQL Server</bf> back-end database management systems.
|
||||||
Besides these four database management systems software. sqlmap can also
|
Besides these four database management systems software. sqlmap can also
|
||||||
identify Microsoft Access, DB2, Informix, Sybase and Interbase.
|
identify Microsoft Access, DB2, Informix, Sybase and Interbase.
|
||||||
|
|
||||||
|
<item>Full support for three SQL injection techniques: <bf> inferential
|
||||||
|
blind SQL injection</bf>, <bf>UNION query (inband) SQL injection</bf> and
|
||||||
|
<bf>stacked queries (multiple statements) support</bf>. sqlmap can also
|
||||||
|
test for <bf>time based blind SQL injection</bf>.
|
||||||
|
|
||||||
<item><bf>Extensive back-end database management system fingerprint</bf>
|
<item><bf>Extensive back-end database management system fingerprint</bf>
|
||||||
based upon
|
based upon
|
||||||
<htmlurl url="http://bernardodamele.blogspot.com/2007/06/database-management-system-fingerprint.html" name="inband error messages">,
|
<htmlurl url="http://bernardodamele.blogspot.com/2007/06/database-management-system-fingerprint.html" name="inband error messages">,
|
||||||
|
@ -204,11 +209,6 @@ database management system name if you already know it. sqlmap is also able
|
||||||
to fingerprint the web server operating system, the web application
|
to fingerprint the web server operating system, the web application
|
||||||
technology and, in some circumstances, the back-end DBMS operating system.
|
technology and, in some circumstances, the back-end DBMS operating system.
|
||||||
|
|
||||||
<item>Full support for three SQL injection techniques: <bf> inferential
|
|
||||||
blind SQL injection</bf>, <bf>UNION query (inband) SQL injection</bf> and
|
|
||||||
<bf>stacked queries (multiple statements) support</bf>. sqlmap can also
|
|
||||||
test for <bf>time based blind SQL injection</bf>.
|
|
||||||
|
|
||||||
<item>Options to retrieve on all four back-end database management system
|
<item>Options to retrieve on all four back-end database management system
|
||||||
<bf>banner</bf>, <bf>current user</bf>, <bf>current database</bf>,
|
<bf>banner</bf>, <bf>current user</bf>, <bf>current database</bf>,
|
||||||
enumerate <bf>users</bf>, <bf>users password hashes</bf>, <bf>users
|
enumerate <bf>users</bf>, <bf>users password hashes</bf>, <bf>users
|
||||||
|
@ -269,6 +269,8 @@ randomly selected from a text file.
|
||||||
there exist <bf>six levels</bf>. The default level is <bf>1</bf> in which
|
there exist <bf>six levels</bf>. The default level is <bf>1</bf> in which
|
||||||
information, warnings, errors and tracebacks, if they occur, will be shown.
|
information, warnings, errors and tracebacks, if they occur, will be shown.
|
||||||
|
|
||||||
|
<item>Granularity in the user's options.
|
||||||
|
|
||||||
<item><bf>Estimated time of arrival</bf> support for each query, updated
|
<item><bf>Estimated time of arrival</bf> support for each query, updated
|
||||||
in real time while fetching the information to give to the user an
|
in real time while fetching the information to give to the user an
|
||||||
overview on how long it will take to retrieve the output.
|
overview on how long it will take to retrieve the output.
|
||||||
|
@ -285,6 +287,10 @@ save command line options on a configuration INI file.
|
||||||
<htmlurl url="http://metasploit.com/framework/" name="Metasploit"> and <htmlurl
|
<htmlurl url="http://metasploit.com/framework/" name="Metasploit"> and <htmlurl
|
||||||
url="http://w3af.sourceforge.net/" name="w3af">.
|
url="http://w3af.sourceforge.net/" name="w3af">.
|
||||||
|
|
||||||
|
<item><bf>File system</bf> read and write access and <bf>operating
|
||||||
|
system</bf> command execution by providing own queries, depending on the
|
||||||
|
session user privileges and back-end DBMS.
|
||||||
|
|
||||||
<item><bf>PHP setting <tt>magic_quotes_gpc</tt> bypass</bf> by encoding
|
<item><bf>PHP setting <tt>magic_quotes_gpc</tt> bypass</bf> by encoding
|
||||||
every query string, between single quotes, with <tt>CHAR</tt>, or similar,
|
every query string, between single quotes, with <tt>CHAR</tt>, or similar,
|
||||||
database management system function.
|
database management system function.
|
||||||
|
@ -355,7 +361,7 @@ and <htmlurl url="mailto:daniele.bellucci@gmail.com" name="Daniele Bellucci">.
|
||||||
$ python sqlmap.py -h
|
$ python sqlmap.py -h
|
||||||
|
|
||||||
sqlmap/0.6.4 coded by Bernardo Damele A. G. <bernardo.damele@gmail.com>
|
sqlmap/0.6.4 coded by Bernardo Damele A. G. <bernardo.damele@gmail.com>
|
||||||
and Daniele Bellucci <daniele.bellucci@gmail.com>
|
and Daniele Bellucci <daniele.bellucci@gmail.com>
|
||||||
|
|
||||||
Usage: sqlmap.py [options]
|
Usage: sqlmap.py [options]
|
||||||
|
|
||||||
|
@ -388,7 +394,7 @@ Options:
|
||||||
--proxy=PROXY Use a HTTP proxy to connect to the target url
|
--proxy=PROXY Use a HTTP proxy to connect to the target url
|
||||||
--threads=THREADS Maximum number of concurrent HTTP requests (default 1)
|
--threads=THREADS Maximum number of concurrent HTTP requests (default 1)
|
||||||
--delay=DELAY Delay in seconds between each HTTP request
|
--delay=DELAY Delay in seconds between each HTTP request
|
||||||
--timeout=TIMEOUT Seconds to wait before timeout connection (default 10)
|
--timeout=TIMEOUT Seconds to wait before timeout connection (default 30)
|
||||||
|
|
||||||
Injection:
|
Injection:
|
||||||
These options can be used to specify which parameters to test for,
|
These options can be used to specify which parameters to test for,
|
||||||
|
@ -411,8 +417,9 @@ Options:
|
||||||
using the default blind SQL injection technique.
|
using the default blind SQL injection technique.
|
||||||
|
|
||||||
--stacked-test Test for stacked queries (multiple statements) support
|
--stacked-test Test for stacked queries (multiple statements) support
|
||||||
--time-test Test for Time based blind SQL injection
|
--time-test Test for time based blind SQL injection
|
||||||
--union-test Test for UNION query (inband) SQL injection
|
--union-test Test for UNION query (inband) SQL injection
|
||||||
|
--union-tech=UTECH Technique to test for UNION query SQL injection
|
||||||
--union-use Use the UNION query (inband) SQL injection to retrieve
|
--union-use Use the UNION query (inband) SQL injection to retrieve
|
||||||
the queries output. No need to go blind
|
the queries output. No need to go blind
|
||||||
|
|
||||||
|
@ -427,6 +434,7 @@ Options:
|
||||||
-b, --banner Retrieve DBMS banner
|
-b, --banner Retrieve DBMS banner
|
||||||
--current-user Retrieve DBMS current user
|
--current-user Retrieve DBMS current user
|
||||||
--current-db Retrieve DBMS current database
|
--current-db Retrieve DBMS current database
|
||||||
|
--is-dba Detect if the DBMS current user is DBA
|
||||||
--users Enumerate DBMS users
|
--users Enumerate DBMS users
|
||||||
--passwords Enumerate DBMS users password hashes (opt: -U)
|
--passwords Enumerate DBMS users password hashes (opt: -U)
|
||||||
--privileges Enumerate DBMS users privileges (opt: -U)
|
--privileges Enumerate DBMS users privileges (opt: -U)
|
||||||
|
@ -1813,7 +1821,7 @@ stacked queries support: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'wRcBC'=
|
||||||
</verb></tscreen>
|
</verb></tscreen>
|
||||||
|
|
||||||
|
|
||||||
<sect2>Test for Time based blind SQL injection
|
<sect2>Test for time based blind SQL injection
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Option: <tt>--time-test</tt>
|
Option: <tt>--time-test</tt>
|
||||||
|
@ -1886,7 +1894,7 @@ time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';
|
||||||
<sect2>Test for UNION query SQL injection
|
<sect2>Test for UNION query SQL injection
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
Option: <tt>--union-test</tt>
|
Options: <tt>--union-test</tt> and <tt>--union-tech</tt>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
It is possible to test if the target URL is affected by an <bf>inband
|
It is possible to test if the target URL is affected by an <bf>inband
|
||||||
|
|
|
@ -163,7 +163,7 @@ def cmdLineParser():
|
||||||
|
|
||||||
techniques.add_option("--time-test", dest="timeTest",
|
techniques.add_option("--time-test", dest="timeTest",
|
||||||
action="store_true",
|
action="store_true",
|
||||||
help="Test for Time based blind SQL injection")
|
help="Test for time based blind SQL injection")
|
||||||
|
|
||||||
techniques.add_option("--union-test", dest="unionTest",
|
techniques.add_option("--union-test", dest="unionTest",
|
||||||
action="store_true",
|
action="store_true",
|
||||||
|
|
|
@ -133,7 +133,7 @@ eRegexp =
|
||||||
# Valid: True or False
|
# Valid: True or False
|
||||||
stackedTest = False
|
stackedTest = False
|
||||||
|
|
||||||
# Test for Time based blind SQL injection.
|
# Test for time based blind SQL injection.
|
||||||
# Valid: True or False
|
# Valid: True or False
|
||||||
timeTest = False
|
timeTest = False
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user