Minor layout adjustments

This commit is contained in:
Bernardo Damele 2010-03-11 23:54:07 +00:00
parent 506403dd9d
commit b50a2288f4
4 changed files with 31 additions and 8 deletions

View File

@ -623,7 +623,7 @@ Options:
--dest-file=DFILE Back-end DBMS absolute filepath to write to --dest-file=DFILE Back-end DBMS absolute filepath to write to
Operating system access: Operating system access:
This option can be used to access the back-end database management These options can be used to access the back-end database management
system underlying operating system. system underlying operating system.
--os-cmd=OSCMD Execute an operating system command --os-cmd=OSCMD Execute an operating system command
@ -636,7 +636,7 @@ Options:
--tmp-path=TMPPATH Remote absolute path of temporary files directory --tmp-path=TMPPATH Remote absolute path of temporary files directory
Windows registry access: Windows registry access:
This option can be used to access the back-end database management These options can be used to access the back-end database management
system Windows registry. system Windows registry.
--reg-read Read a Windows registry key value --reg-read Read a Windows registry key value

View File

@ -327,8 +327,8 @@ def cmdLineParser():
"write to") "write to")
# Takeover options # Takeover options
takeover = OptionGroup(parser, "Operating system access", "This " takeover = OptionGroup(parser, "Operating system access", "These "
"option can be used to access the back-end " "options can be used to access the back-end "
"database management system underlying " "database management system underlying "
"operating system.") "operating system.")
@ -364,8 +364,8 @@ def cmdLineParser():
"directory") "directory")
# Windows registry options # Windows registry options
windows = OptionGroup(parser, "Windows registry access", "This " windows = OptionGroup(parser, "Windows registry access", "These "
"option can be used to access the back-end " "options can be used to access the back-end "
"database management system Windows " "database management system Windows "
"registry.") "registry.")

View File

@ -42,7 +42,7 @@ class Registry:
self.__randStr = randomStr(lowercase=True) self.__randStr = randomStr(lowercase=True)
self.__batPathRemote = "%s/tmpr%s.bat" % (conf.tmpPath, self.__randStr) self.__batPathRemote = "%s/tmpr%s.bat" % (conf.tmpPath, self.__randStr)
self.__batPathLocal = os.path.join(conf.outputPath, "tmpr%s%s.bat" % (self.__operation, self.__randStr)) self.__batPathLocal = os.path.join(conf.outputPath, "tmpr%s.bat" % self.__randStr)
if parse: if parse:
readParse = "FOR /F \"tokens=2* delims==\" %%A IN ('REG QUERY \"" + self.__regKey + "\" /v \"" + self.__regValue + "\"') DO SET value=%%A\r\nECHO %value%\r\n" readParse = "FOR /F \"tokens=2* delims==\" %%A IN ('REG QUERY \"" + self.__regKey + "\" /v \"" + self.__regValue + "\"') DO SET value=%%A\r\nECHO %value%\r\n"

View File

@ -1,3 +1,5 @@
# At least one of these options has to be specified to set the source to
# get target urls from.
[Target] [Target]
# Target URL. # Target URL.
@ -21,6 +23,8 @@ requestFile =
# Example: +ext:php +inurl:"&id=" +intext:"powered by " # Example: +ext:php +inurl:"&id=" +intext:"powered by "
googleDork = googleDork =
# These options can be used to specify how to connect to the target url.
[Request] [Request]
# HTTP method to perform HTTP requests. # HTTP method to perform HTTP requests.
@ -111,6 +115,10 @@ retries = 3
# Example: (google|yahoo) # Example: (google|yahoo)
scope = scope =
# These options can be used to specify which parameters to test for,
# provide custom injection payloads and how to parse and compare HTTP
# responses page content when using the blind SQL injection technique.
[Injection] [Injection]
# Testable parameter(s) comma separated. By default all GET/POST/Cookie # Testable parameter(s) comma separated. By default all GET/POST/Cookie
@ -163,6 +171,10 @@ eString =
# (http://www.python.org/doc/2.5.2/lib/re-syntax.html) # (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
eRegexp = eRegexp =
# These options can be used to test for specific SQL injection technique
# or to use one of them to exploit the affected parameter(s) rather than
# using the default blind SQL injection technique.
[Techniques] [Techniques]
# Test for stacked queries (multiple statements) support. # Test for stacked queries (multiple statements) support.
@ -203,6 +215,9 @@ unionUse = False
extensiveFp = False extensiveFp = False
# These options can be used to enumerate the back-end database
# management system information, structure and data contained in the
# tables. Moreover you can run your own SQL statements.
[Enumeration] [Enumeration]
# Retrieve back-end database management system banner. # Retrieve back-end database management system banner.
@ -249,7 +264,8 @@ getTables = False
getColumns = False getColumns = False
# Dump back-end database management system database table entries. # Dump back-end database management system database table entries.
# Optional: db, tbl and col # Requires: tbl and/or col
# Optional: db
# Valid: True or False # Valid: True or False
dumpTable = False dumpTable = False
@ -306,6 +322,7 @@ query =
sqlShell = False sqlShell = False
# These options can be used to create custom user-defined functions.
[User-defined function] [User-defined function]
# Inject custom user-defined functions # Inject custom user-defined functions
@ -316,6 +333,8 @@ udfInject = False
shLib = shLib =
# These options can be used to access the back-end database management
# system underlying file system.
[File system] [File system]
# Read a specific file from the back-end DBMS underlying file system. # Read a specific file from the back-end DBMS underlying file system.
@ -331,6 +350,8 @@ wFile =
dFile = dFile =
# These options can be used to access the back-end database management
# system underlying operating system.
[Takeover] [Takeover]
# Execute an operating system command. # Execute an operating system command.
@ -369,6 +390,8 @@ msfPath =
tmpPath = tmpPath =
# These options can be used to access the back-end database management
# system Windows registry.
[Windows] [Windows]
# Read a Windows registry key value # Read a Windows registry key value