From 9e2013330ec70e4a7abd39bf2f8f38dad98e3042 Mon Sep 17 00:00:00 2001 From: stamparm Date: Fri, 29 Jun 2012 13:40:29 -0700 Subject: [PATCH] Updated sqlmap user's manual (markdown) --- sqlmap-user's-manual.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sqlmap-user's-manual.md b/sqlmap-user's-manual.md index 6db722b62..f3950ea76 100644 --- a/sqlmap-user's-manual.md +++ b/sqlmap-user's-manual.md @@ -92,7 +92,7 @@ sqlmap is able to detect and exploit five different SQL injection **types**: parameter in the HTTP request, a semi-colon (`;`) followed by the SQL statement to be executed. This technique is useful to run SQL statements other than `SELECT`, like for instance, **data definition** or **data manipulation** statements, possibly leading to file system read and write access and operating system command execution depending on the underlying back-end database management system and the session user privileges. ## Demo -You can watch several demo videos, they are hosted on [YouTube](http://www.youtube.com/user/inquisb). +You can watch several demo videos on [YouTube](http://www.youtube.com/user/inquisb). Also, you can find lots of examples against publicly available vulnerable web applications made for legal web assessment [here](http://unconciousmind.blogspot.com/search/label/sqlmap). # Features Features implemented in sqlmap include: