mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-10-31 16:07:55 +03:00 
			
		
		
		
	Updated sqlmap user's manual (markdown)
This commit is contained in:
		
							parent
							
								
									f80cab6ae5
								
							
						
					
					
						commit
						9e2013330e
					
				|  | @ -92,7 +92,7 @@ sqlmap is able to detect and exploit five different SQL injection **types**: | ||||||
| parameter in the HTTP request, a semi-colon (`;`) followed by the SQL statement to be executed. This technique is useful to run SQL statements other than `SELECT`, like for instance, **data definition** or **data manipulation** statements, possibly leading to file system read and write access and operating system command execution depending on the underlying back-end database management system and the session user privileges. | parameter in the HTTP request, a semi-colon (`;`) followed by the SQL statement to be executed. This technique is useful to run SQL statements other than `SELECT`, like for instance, **data definition** or **data manipulation** statements, possibly leading to file system read and write access and operating system command execution depending on the underlying back-end database management system and the session user privileges. | ||||||
| 
 | 
 | ||||||
| ## Demo | ## Demo | ||||||
| You can watch several demo videos, they are hosted on [YouTube](http://www.youtube.com/user/inquisb). | You can watch several demo videos on [YouTube](http://www.youtube.com/user/inquisb). Also, you can find lots of examples against publicly available vulnerable web applications made for legal web assessment [here](http://unconciousmind.blogspot.com/search/label/sqlmap). | ||||||
| 
 | 
 | ||||||
| # Features | # Features | ||||||
| Features implemented in sqlmap include: | Features implemented in sqlmap include: | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue
	
	Block a user