mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 01:26:42 +03:00
more doc updates
This commit is contained in:
parent
fbf8e7f32d
commit
9840a0491d
|
@ -105,9 +105,9 @@ it packaged in their formats and ready to be installed.
|
|||
Windows users can download and install the Python setup-ready installer
|
||||
for x86, AMD64 and Itanium too.</P>
|
||||
<P>sqlmap relies on the
|
||||
<A HREF="http://metasploit.com/framework/">Metasploit Framework</A> for some of its post-exploitation takeover
|
||||
<A HREF="http://metasploit.com">Metasploit Framework</A> for some of its post-exploitation takeover
|
||||
features. You need to grab a copy of it from the
|
||||
<A HREF="http://metasploit.com/framework/download/">download</A>
|
||||
<A HREF="http://metasploit.com/download/">download</A>
|
||||
page - the required version is <B>3.5</B> or higher.
|
||||
For the ICMP tunneling out-of-band takeover technique, sqlmap requires
|
||||
<A HREF="http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=tool&name=Impacket">Impacket</A> library too.</P>
|
||||
|
@ -418,7 +418,7 @@ subversion repository.
|
|||
message to the user.
|
||||
</LI>
|
||||
<LI>Integration with other IT security open source projects,
|
||||
<A HREF="http://metasploit.com/framework/">Metasploit</A> and
|
||||
<A HREF="http://metasploit.com">Metasploit</A> and
|
||||
<A HREF="http://w3af.sourceforge.net/">w3af</A>.</LI>
|
||||
</UL>
|
||||
</P>
|
||||
|
@ -727,7 +727,7 @@ release only.
|
|||
<LI><B>October 20</B>, sqlmap first point release, <B>0.6.1</B>, goes
|
||||
public. This includes minor bug fixes and the first contact between the
|
||||
tool and
|
||||
<A HREF="http://metasploit.com/framework">Metasploit</A>:
|
||||
<A HREF="http://metasploit.com">Metasploit</A>:
|
||||
an auxiliary module to launch sqlmap from within Metasploit Framework.
|
||||
The
|
||||
<A HREF="https://svn.sqlmap.org/sqlmap/trunk/sqlmap/">subversion development repository</A> goes public again.
|
||||
|
@ -1445,16 +1445,16 @@ it.</P>
|
|||
<P>Switch: <CODE>-</CODE><CODE>-predict-output</CODE></P>
|
||||
|
||||
<P>This switch is used in inference algorithm for sequential statistical
|
||||
prediction of characters of value being retrieved. Based on items given in
|
||||
<CODE>txt/common-outputs.txt</CODE> together with the knowledge of current
|
||||
enumeration used statistical table with the most promising values is being
|
||||
built. In case that the value can be found among the common output values,
|
||||
as the process progresses, subsequent character tables are being narrowed
|
||||
more and more. If used in combination with retrieval of common DBMS
|
||||
entities, as with system table names and privileges, speed up is
|
||||
significant. Of course, you can edit the common outputs file according to
|
||||
your needs if, for instance, you notice common patterns in database table
|
||||
names or similar.</P>
|
||||
prediction of characters of value being retrieved. Statistical table with
|
||||
the most promising character values is being built based on items given in
|
||||
<CODE>txt/common-outputs.txt</CODE> combined with the knowledge of current
|
||||
enumeration used. In case that the value can be found among the common
|
||||
output values, as the process progresses, subsequent character tables are
|
||||
being narrowed more and more. If used in combination with retrieval of
|
||||
common DBMS entities, as with system table names and privileges, speed up
|
||||
is significant. Of course, you can edit the common outputs file according
|
||||
to your needs if, for instance, you notice common patterns in database
|
||||
table names or similar.</P>
|
||||
|
||||
<P>Note that this switch is not compatible with <CODE>-</CODE><CODE>-threads</CODE>
|
||||
switch.</P>
|
||||
|
@ -1507,9 +1507,8 @@ assigned to retrieve one character of the query output. The thread ends
|
|||
when that character is retrieved - it takes up to 7 HTTP(S) requests with
|
||||
the bisection algorithm implemented in sqlmap.</P>
|
||||
|
||||
<P>Note that the multi-threading switch does not affect any other SQL
|
||||
injection technique. The maximum number of concurrent requests is set to
|
||||
<B>10</B> for performance and site reliability reasons.</P>
|
||||
<P>The maximum number of concurrent requests is set to <B>10</B> for
|
||||
performance and site reliability reasons.</P>
|
||||
|
||||
<P>Note that this switch is not compatible with
|
||||
<CODE>-</CODE><CODE>-predict-output</CODE> switch.</P>
|
||||
|
@ -1682,7 +1681,7 @@ comma-separated as the argument of <CODE>-</CODE><CODE>-tamper</CODE> switch.</P
|
|||
from lib.core.enums import PRIORITY
|
||||
|
||||
# Define which is the order of application of tamper scripts against the payload
|
||||
__priority__ = PRIORITY.HIGHEST
|
||||
__priority__ = PRIORITY.NORMAL
|
||||
|
||||
def tamper(payload):
|
||||
'''
|
||||
|
@ -1691,8 +1690,9 @@ def tamper(payload):
|
|||
|
||||
retVal = payload
|
||||
|
||||
# your code to tamper the original payload (retVal)
|
||||
# your code to tamper the original payload
|
||||
|
||||
# return the tampered payload
|
||||
return retVal
|
||||
</PRE>
|
||||
</CODE></BLOCKQUOTE>
|
||||
|
@ -1701,12 +1701,12 @@ def tamper(payload):
|
|||
<P>You can check valid and usable tamper scripts in the <CODE>tamper/</CODE>
|
||||
directory.</P>
|
||||
|
||||
<P>Example against a MySQL target assuming <CODE>></CODE> character, spaces and
|
||||
<CODE>SELECT</CODE> string are banned:</P>
|
||||
<P>Example against a MySQL target assuming that <CODE>></CODE> character,
|
||||
spaces and capital <CODE>SELECT</CODE> string are banned:</P>
|
||||
<P>
|
||||
<BLOCKQUOTE><CODE>
|
||||
<PRE>
|
||||
$ python sqlmap.py -u "http://debiandev/sqlmap/mysql/get_int.php?id=1" --tamper \
|
||||
$ python sqlmap.py -u "http://192.168.136.131/sqlmap/mysql/get_int.php?id=1" --tamper \
|
||||
tamper/between.py,tamper/randomcase.py,tamper/space2comment.py -v 3
|
||||
|
||||
[hh:mm:03] [DEBUG] cleaning up configuration parameters
|
||||
|
@ -1816,7 +1816,7 @@ injected) page content with the injected wrong page content.
|
|||
This way the distinction will be based upon string presence or regular
|
||||
expression match.</P>
|
||||
|
||||
<P>In cases with lot of active (e.g. scripts, embeds, etc.) content in the
|
||||
<P>In cases with lot of active content (e.g. scripts, embeds, etc.) in the
|
||||
HTTP responses' body, you can filter pages (<CODE>-</CODE><CODE>-text-only</CODE>
|
||||
switch) just for their textual content. This way, in a good number of
|
||||
cases, you can automatically tune the detection engine.</P>
|
||||
|
@ -2987,7 +2987,7 @@ a <CODE><DB_NAME>/<TABLE_NAME>.csv</CODE> file into
|
|||
|
||||
<P>You can then use sqlmap itself to read and query the locally created
|
||||
SQLite 3 file. For instance, <CODE>python sqlmap.py -d
|
||||
sqlite:///tmp/sqlmap/output/debiandev/dump/testdb.sqlite3 --table</CODE>.</P>
|
||||
sqlite:///tmp/sqlmap/output/192.168.136.131/dump/testdb.sqlite3 --table</CODE>.</P>
|
||||
|
||||
|
||||
<H3>Simple wizard interface for beginner users</H3>
|
||||
|
|
BIN
doc/README.pdf
BIN
doc/README.pdf
Binary file not shown.
|
@ -40,10 +40,10 @@ it packaged in their formats and ready to be installed.
|
|||
Windows users can download and install the Python setup-ready installer
|
||||
for x86, AMD64 and Itanium too.
|
||||
|
||||
sqlmap relies on the <htmlurl url="http://metasploit.com/framework/"
|
||||
sqlmap relies on the <htmlurl url="http://metasploit.com"
|
||||
name="Metasploit Framework"> for some of its post-exploitation takeover
|
||||
features. You need to grab a copy of it from the
|
||||
<htmlurl url="http://metasploit.com/framework/download/" name="download">
|
||||
<htmlurl url="http://metasploit.com/download/" name="download">
|
||||
page - the required version is <bf>3.5</bf> or higher.
|
||||
For the ICMP tunneling out-of-band takeover technique, sqlmap requires
|
||||
<htmlurl url="http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=tool&name=Impacket"
|
||||
|
@ -346,7 +346,7 @@ subversion repository.
|
|||
message to the user.
|
||||
|
||||
<item>Integration with other IT security open source projects,
|
||||
<htmlurl url="http://metasploit.com/framework/" name="Metasploit"> and <htmlurl
|
||||
<htmlurl url="http://metasploit.com" name="Metasploit"> and <htmlurl
|
||||
url="http://w3af.sourceforge.net/" name="w3af">.
|
||||
</itemize>
|
||||
|
||||
|
@ -650,7 +650,7 @@ release only.
|
|||
|
||||
<item><bf>October 20</bf>, sqlmap first point release, <bf>0.6.1</bf>, goes
|
||||
public. This includes minor bug fixes and the first contact between the
|
||||
tool and <htmlurl url="http://metasploit.com/framework" name="Metasploit">:
|
||||
tool and <htmlurl url="http://metasploit.com" name="Metasploit">:
|
||||
an auxiliary module to launch sqlmap from within Metasploit Framework.
|
||||
The <htmlurl url="https://svn.sqlmap.org/sqlmap/trunk/sqlmap/"
|
||||
name="subversion development repository"> goes public again.
|
||||
|
@ -1403,16 +1403,16 @@ Switch: <tt>-</tt><tt>-predict-output</tt>
|
|||
|
||||
<p>
|
||||
This switch is used in inference algorithm for sequential statistical
|
||||
prediction of characters of value being retrieved. Based on items given in
|
||||
<tt>txt/common-outputs.txt</tt> together with the knowledge of current
|
||||
enumeration used statistical table with the most promising values is being
|
||||
built. In case that the value can be found among the common output values,
|
||||
as the process progresses, subsequent character tables are being narrowed
|
||||
more and more. If used in combination with retrieval of common DBMS
|
||||
entities, as with system table names and privileges, speed up is
|
||||
significant. Of course, you can edit the common outputs file according to
|
||||
your needs if, for instance, you notice common patterns in database table
|
||||
names or similar.
|
||||
prediction of characters of value being retrieved. Statistical table with
|
||||
the most promising character values is being built based on items given in
|
||||
<tt>txt/common-outputs.txt</tt> combined with the knowledge of current
|
||||
enumeration used. In case that the value can be found among the common
|
||||
output values, as the process progresses, subsequent character tables are
|
||||
being narrowed more and more. If used in combination with retrieval of
|
||||
common DBMS entities, as with system table names and privileges, speed up
|
||||
is significant. Of course, you can edit the common outputs file according
|
||||
to your needs if, for instance, you notice common patterns in database
|
||||
table names or similar.
|
||||
|
||||
<p>
|
||||
Note that this switch is not compatible with <tt>-</tt><tt>-threads</tt>
|
||||
|
@ -1666,7 +1666,7 @@ The format of a valid tamper script is as follows:
|
|||
from lib.core.enums import PRIORITY
|
||||
|
||||
# Define which is the order of application of tamper scripts against the payload
|
||||
__priority__ = PRIORITY.HIGHEST
|
||||
__priority__ = PRIORITY.NORMAL
|
||||
|
||||
def tamper(payload):
|
||||
'''
|
||||
|
@ -1675,8 +1675,9 @@ def tamper(payload):
|
|||
|
||||
retVal = payload
|
||||
|
||||
# your code to tamper the original payload (retVal)
|
||||
# your code to tamper the original payload
|
||||
|
||||
# return the tampered payload
|
||||
return retVal
|
||||
</verb></tscreen>
|
||||
|
||||
|
@ -1685,11 +1686,11 @@ You can check valid and usable tamper scripts in the <tt>tamper/</tt>
|
|||
directory.
|
||||
|
||||
<p>
|
||||
Example against a MySQL target assuming <tt>></tt> character, spaces and
|
||||
<tt>SELECT</tt> string are banned:
|
||||
Example against a MySQL target assuming that <tt>></tt> character,
|
||||
spaces and capital <tt>SELECT</tt> string are banned:
|
||||
|
||||
<tscreen><verb>
|
||||
$ python sqlmap.py -u "http://debiandev/sqlmap/mysql/get_int.php?id=1" --tamper \
|
||||
$ python sqlmap.py -u "http://192.168.136.131/sqlmap/mysql/get_int.php?id=1" --tamper \
|
||||
tamper/between.py,tamper/randomcase.py,tamper/space2comment.py -v 3
|
||||
|
||||
[hh:mm:03] [DEBUG] cleaning up configuration parameters
|
||||
|
@ -1809,7 +1810,7 @@ This way the distinction will be based upon string presence or regular
|
|||
expression match.
|
||||
|
||||
<p>
|
||||
In cases with lot of active (e.g. scripts, embeds, etc.) content in the
|
||||
In cases with lot of active content (e.g. scripts, embeds, etc.) in the
|
||||
HTTP responses' body, you can filter pages (<tt>-</tt><tt>-text-only</tt>
|
||||
switch) just for their textual content. This way, in a good number of
|
||||
cases, you can automatically tune the detection engine.
|
||||
|
@ -3116,7 +3117,7 @@ a <tt><DB_NAME>/<TABLE_NAME>.csv</tt> file into
|
|||
<p>
|
||||
You can then use sqlmap itself to read and query the locally created
|
||||
SQLite 3 file. For instance, <tt>python sqlmap.py -d
|
||||
sqlite:///tmp/sqlmap/output/debiandev/dump/testdb.sqlite3 --table</tt>.
|
||||
sqlite:///tmp/sqlmap/output/192.168.136.131/dump/testdb.sqlite3 --table</tt>.
|
||||
|
||||
|
||||
<sect2>Simple wizard interface for beginner users
|
||||
|
|
Loading…
Reference in New Issue
Block a user