mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 17:46:37 +03:00
Minor layout adjustments
This commit is contained in:
parent
506403dd9d
commit
b50a2288f4
|
@ -623,7 +623,7 @@ Options:
|
||||||
--dest-file=DFILE Back-end DBMS absolute filepath to write to
|
--dest-file=DFILE Back-end DBMS absolute filepath to write to
|
||||||
|
|
||||||
Operating system access:
|
Operating system access:
|
||||||
This option can be used to access the back-end database management
|
These options can be used to access the back-end database management
|
||||||
system underlying operating system.
|
system underlying operating system.
|
||||||
|
|
||||||
--os-cmd=OSCMD Execute an operating system command
|
--os-cmd=OSCMD Execute an operating system command
|
||||||
|
@ -636,7 +636,7 @@ Options:
|
||||||
--tmp-path=TMPPATH Remote absolute path of temporary files directory
|
--tmp-path=TMPPATH Remote absolute path of temporary files directory
|
||||||
|
|
||||||
Windows registry access:
|
Windows registry access:
|
||||||
This option can be used to access the back-end database management
|
These options can be used to access the back-end database management
|
||||||
system Windows registry.
|
system Windows registry.
|
||||||
|
|
||||||
--reg-read Read a Windows registry key value
|
--reg-read Read a Windows registry key value
|
||||||
|
|
|
@ -327,8 +327,8 @@ def cmdLineParser():
|
||||||
"write to")
|
"write to")
|
||||||
|
|
||||||
# Takeover options
|
# Takeover options
|
||||||
takeover = OptionGroup(parser, "Operating system access", "This "
|
takeover = OptionGroup(parser, "Operating system access", "These "
|
||||||
"option can be used to access the back-end "
|
"options can be used to access the back-end "
|
||||||
"database management system underlying "
|
"database management system underlying "
|
||||||
"operating system.")
|
"operating system.")
|
||||||
|
|
||||||
|
@ -364,8 +364,8 @@ def cmdLineParser():
|
||||||
"directory")
|
"directory")
|
||||||
|
|
||||||
# Windows registry options
|
# Windows registry options
|
||||||
windows = OptionGroup(parser, "Windows registry access", "This "
|
windows = OptionGroup(parser, "Windows registry access", "These "
|
||||||
"option can be used to access the back-end "
|
"options can be used to access the back-end "
|
||||||
"database management system Windows "
|
"database management system Windows "
|
||||||
"registry.")
|
"registry.")
|
||||||
|
|
||||||
|
|
|
@ -42,7 +42,7 @@ class Registry:
|
||||||
|
|
||||||
self.__randStr = randomStr(lowercase=True)
|
self.__randStr = randomStr(lowercase=True)
|
||||||
self.__batPathRemote = "%s/tmpr%s.bat" % (conf.tmpPath, self.__randStr)
|
self.__batPathRemote = "%s/tmpr%s.bat" % (conf.tmpPath, self.__randStr)
|
||||||
self.__batPathLocal = os.path.join(conf.outputPath, "tmpr%s%s.bat" % (self.__operation, self.__randStr))
|
self.__batPathLocal = os.path.join(conf.outputPath, "tmpr%s.bat" % self.__randStr)
|
||||||
|
|
||||||
if parse:
|
if parse:
|
||||||
readParse = "FOR /F \"tokens=2* delims==\" %%A IN ('REG QUERY \"" + self.__regKey + "\" /v \"" + self.__regValue + "\"') DO SET value=%%A\r\nECHO %value%\r\n"
|
readParse = "FOR /F \"tokens=2* delims==\" %%A IN ('REG QUERY \"" + self.__regKey + "\" /v \"" + self.__regValue + "\"') DO SET value=%%A\r\nECHO %value%\r\n"
|
||||||
|
|
25
sqlmap.conf
25
sqlmap.conf
|
@ -1,3 +1,5 @@
|
||||||
|
# At least one of these options has to be specified to set the source to
|
||||||
|
# get target urls from.
|
||||||
[Target]
|
[Target]
|
||||||
|
|
||||||
# Target URL.
|
# Target URL.
|
||||||
|
@ -21,6 +23,8 @@ requestFile =
|
||||||
# Example: +ext:php +inurl:"&id=" +intext:"powered by "
|
# Example: +ext:php +inurl:"&id=" +intext:"powered by "
|
||||||
googleDork =
|
googleDork =
|
||||||
|
|
||||||
|
|
||||||
|
# These options can be used to specify how to connect to the target url.
|
||||||
[Request]
|
[Request]
|
||||||
|
|
||||||
# HTTP method to perform HTTP requests.
|
# HTTP method to perform HTTP requests.
|
||||||
|
@ -111,6 +115,10 @@ retries = 3
|
||||||
# Example: (google|yahoo)
|
# Example: (google|yahoo)
|
||||||
scope =
|
scope =
|
||||||
|
|
||||||
|
|
||||||
|
# These options can be used to specify which parameters to test for,
|
||||||
|
# provide custom injection payloads and how to parse and compare HTTP
|
||||||
|
# responses page content when using the blind SQL injection technique.
|
||||||
[Injection]
|
[Injection]
|
||||||
|
|
||||||
# Testable parameter(s) comma separated. By default all GET/POST/Cookie
|
# Testable parameter(s) comma separated. By default all GET/POST/Cookie
|
||||||
|
@ -163,6 +171,10 @@ eString =
|
||||||
# (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
|
# (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
|
||||||
eRegexp =
|
eRegexp =
|
||||||
|
|
||||||
|
|
||||||
|
# These options can be used to test for specific SQL injection technique
|
||||||
|
# or to use one of them to exploit the affected parameter(s) rather than
|
||||||
|
# using the default blind SQL injection technique.
|
||||||
[Techniques]
|
[Techniques]
|
||||||
|
|
||||||
# Test for stacked queries (multiple statements) support.
|
# Test for stacked queries (multiple statements) support.
|
||||||
|
@ -203,6 +215,9 @@ unionUse = False
|
||||||
extensiveFp = False
|
extensiveFp = False
|
||||||
|
|
||||||
|
|
||||||
|
# These options can be used to enumerate the back-end database
|
||||||
|
# management system information, structure and data contained in the
|
||||||
|
# tables. Moreover you can run your own SQL statements.
|
||||||
[Enumeration]
|
[Enumeration]
|
||||||
|
|
||||||
# Retrieve back-end database management system banner.
|
# Retrieve back-end database management system banner.
|
||||||
|
@ -249,7 +264,8 @@ getTables = False
|
||||||
getColumns = False
|
getColumns = False
|
||||||
|
|
||||||
# Dump back-end database management system database table entries.
|
# Dump back-end database management system database table entries.
|
||||||
# Optional: db, tbl and col
|
# Requires: tbl and/or col
|
||||||
|
# Optional: db
|
||||||
# Valid: True or False
|
# Valid: True or False
|
||||||
dumpTable = False
|
dumpTable = False
|
||||||
|
|
||||||
|
@ -306,6 +322,7 @@ query =
|
||||||
sqlShell = False
|
sqlShell = False
|
||||||
|
|
||||||
|
|
||||||
|
# These options can be used to create custom user-defined functions.
|
||||||
[User-defined function]
|
[User-defined function]
|
||||||
|
|
||||||
# Inject custom user-defined functions
|
# Inject custom user-defined functions
|
||||||
|
@ -316,6 +333,8 @@ udfInject = False
|
||||||
shLib =
|
shLib =
|
||||||
|
|
||||||
|
|
||||||
|
# These options can be used to access the back-end database management
|
||||||
|
# system underlying file system.
|
||||||
[File system]
|
[File system]
|
||||||
|
|
||||||
# Read a specific file from the back-end DBMS underlying file system.
|
# Read a specific file from the back-end DBMS underlying file system.
|
||||||
|
@ -331,6 +350,8 @@ wFile =
|
||||||
dFile =
|
dFile =
|
||||||
|
|
||||||
|
|
||||||
|
# These options can be used to access the back-end database management
|
||||||
|
# system underlying operating system.
|
||||||
[Takeover]
|
[Takeover]
|
||||||
|
|
||||||
# Execute an operating system command.
|
# Execute an operating system command.
|
||||||
|
@ -369,6 +390,8 @@ msfPath =
|
||||||
tmpPath =
|
tmpPath =
|
||||||
|
|
||||||
|
|
||||||
|
# These options can be used to access the back-end database management
|
||||||
|
# system Windows registry.
|
||||||
[Windows]
|
[Windows]
|
||||||
|
|
||||||
# Read a Windows registry key value
|
# Read a Windows registry key value
|
||||||
|
|
Loading…
Reference in New Issue
Block a user