diff --git a/doc/README.html b/doc/README.html
index 723fe96fe..6d01bf3cb 100644
--- a/doc/README.html
+++ b/doc/README.html
@@ -37,15 +37,16 @@ for the latest version.
@@ -399,6 +400,7 @@ Usage: sqlmap.py [options]
Options:
--version show program's version number and exit
-h, --help show this help message and exit
+ -v VERBOSE Verbosity level: 0-5 (default 1)
Target:
At least one of these options has to be specified to set the source to
@@ -502,7 +504,6 @@ Options:
Miscellaneous:
--eta Retrieve each query output length and calculate the
estimated time of arrival in real time
- -v VERBOSE Verbosity level: 0-5 (default 1)
--update Update sqlmap to the latest stable version
-s SESSIONFILE Save and resume all data retrieved on a session file
--save Save options on a configuration INI file
@@ -512,35 +513,9 @@ Options:
-At least one of these options has to be specified to set the source to get
-target urls from.
-
-Target URL
-
-Option: -u
or --url
-
-To run sqlmap on a single target URL.
-
-Example on a MySQL 5.0.67 target:
-
-
-
-$ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int.php?id=1"
-
-[...]
-web server operating system: Linux Ubuntu 8.10 (Intrepid Ibex)
-web application technology: PHP 5.2.6, Apache 2.2.9
-back-end DBMS: MySQL >= 5.0.0
-
-
-
-
-
-Target URL and verbosity
-
Option: -v
Verbose options can be used to set the verbosity level of output messages.
@@ -762,6 +737,33 @@ Content-Type: text/html
+5.2 Target
+
+
+At least one of these options has to be specified to set the source to get
+target urls from.
+
+Target URL
+
+Option: -u
or --url
+
+To run sqlmap on a single target URL.
+
+Example on a MySQL 5.0.67 target:
+
+
+
+$ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int.php?id=1"
+
+[...]
+web server operating system: Linux Ubuntu 8.10 (Intrepid Ibex)
+web application technology: PHP 5.2.6, Apache 2.2.9
+back-end DBMS: MySQL >= 5.0.0
+
+
+
+
+
Parse targets from Burp or WebScarab logs
Option: -l
@@ -903,7 +905,7 @@ evaluated when running sqlmap and overwrite the same options, if set, in
the provided configuration file.
-5.2 Request
+5.3 Request
These options can be used to specify how to connect to the target url.
@@ -1367,7 +1369,7 @@ the HTTP request timed out. The valid value is a float, for instance
10.5 means ten seconds and a half.
-5.3 Injection
+5.4 Injection
These options can be used to specify which parameters to test for, provide
@@ -1573,9 +1575,9 @@ SELECT * FROM users WHERE id=('1') AND 7433=7433 AND ('test'='test') LIMIT 0, 1
-In this simple example sqlmap could detect the SQL injection and exploit it
-without need to provide a custom injection payload, but sometimes on real
-world application it is necessary to provide a custom injection payload.
+In this simple example, sqlmap could detect the SQL injection and exploit
+it without need to provide a custom injection payload, but sometimes in
+the real world application it is necessary to provide it.
Page comparison
@@ -1799,7 +1801,7 @@ $ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int_refresh.php?id=
stability test.
-5.4 Techniques
+5.5 Techniques
Test for stacked queries (multiple statements) support
@@ -1928,11 +1930,16 @@ $ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" \
[...]
back-end DBMS: Microsoft SQL Server 2005
-[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with AND condition syntax
-[15:32:59] [WARNING] the parameter 'name' is not affected by a time based blind sql injection with AND condition syntax
-[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked query syntax
-[15:33:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with stacked query syntax
-time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'PmrXn'='PmrXn'
+[hh:mm:59] [INFO] testing time based blind sql injection on parameter 'name' with AND
+condition syntax
+[hh:mm:59] [WARNING] the parameter 'name' is not affected by a time based blind sql
+injection with AND condition syntax
+[hh:mm:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked
+query syntax
+[hh:mm:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with
+stacked query syntax
+time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND
+'PmrXn'='PmrXn'
@@ -2159,7 +2166,7 @@ SELECT statement to produce one entry at a time and display it in the
page content.
-5.5 Fingerprint
+5.6 Fingerprint
Extensive database management system fingerprint
@@ -2472,7 +2479,7 @@ parsing library that fetches data from Chip Andrews'
SQLSecurity.com site and outputs it to the XML versions file.
-5.6 Enumeration
+5.7 Enumeration
Banner
@@ -3749,7 +3756,7 @@ column names of the table then asks if the query can return multiple
entries and goes on.
-5.7 File system access
+5.8 File system access
Read a specific file content
@@ -3793,7 +3800,7 @@ inquis:x:1000:100:Bernardo Damele A. G.,,,:/home/inquis:/bin/bash
-5.8 Operating system access
+5.9 Operating system access
Prompt for an interactive operating system shell
@@ -3831,7 +3838,7 @@ $ exit
functionalities of SQL shell in terms of TAB completion and history support.
-5.9 Miscellaneous
+5.10 Miscellaneous
Estimated time of arrival
diff --git a/doc/README.pdf b/doc/README.pdf
index 7d6b45333..49650c621 100644
Binary files a/doc/README.pdf and b/doc/README.pdf differ
diff --git a/doc/README.sgml b/doc/README.sgml
index 77042e507..c35a2de1f 100644
--- a/doc/README.sgml
+++ b/doc/README.sgml
@@ -356,6 +356,7 @@ Usage: sqlmap.py [options]
Options:
--version show program's version number and exit
-h, --help show this help message and exit
+ -v VERBOSE Verbosity level: 0-5 (default 1)
Target:
At least one of these options has to be specified to set the source to
@@ -459,7 +460,6 @@ Options:
Miscellaneous:
--eta Retrieve each query output length and calculate the
estimated time of arrival in real time
- -v VERBOSE Verbosity level: 0-5 (default 1)
--update Update sqlmap to the latest stable version
-s SESSIONFILE Save and resume all data retrieved on a session file
--save Save options on a configuration INI file
@@ -467,34 +467,7 @@ Options:
-Target
-
-
-At least one of these options has to be specified to set the source to get
-target urls from.
-
-Target URL
-
-
-Option: -u or --url
-
-
-To run sqlmap on a single target URL.
-
-
-Example on a MySQL 5.0.67 target:
-
-
-$ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int.php?id=1"
-
-[...]
-web server operating system: Linux Ubuntu 8.10 (Intrepid Ibex)
-web application technology: PHP 5.2.6, Apache 2.2.9
-back-end DBMS: MySQL >= 5.0.0
-
-
-
-Target URL and verbosity
+Output verbosity
Option: -v
@@ -709,6 +682,33 @@ Content-Type: text/html
+Target
+
+
+At least one of these options has to be specified to set the source to get
+target urls from.
+
+Target URL
+
+
+Option: -u or --url
+
+
+To run sqlmap on a single target URL.
+
+
+Example on a MySQL 5.0.67 target:
+
+
+$ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int.php?id=1"
+
+[...]
+web server operating system: Linux Ubuntu 8.10 (Intrepid Ibex)
+web application technology: PHP 5.2.6, Apache 2.2.9
+back-end DBMS: MySQL >= 5.0.0
+
+
+
Parse targets from Burp or WebScarab logs
@@ -1513,9 +1513,9 @@ SELECT * FROM users WHERE id=('1') AND 7433=7433 AND ('test'='test') LIMIT 0, 1
-In this simple example sqlmap could detect the SQL injection and exploit it
-without need to provide a custom injection payload, but sometimes on real
-world application it is necessary to provide a custom injection payload.
+In this simple example, sqlmap could detect the SQL injection and exploit
+it without need to provide a custom injection payload, but sometimes in
+the real world application it is necessary to provide it.
Page comparison
@@ -1864,11 +1864,16 @@ $ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" \
[...]
back-end DBMS: Microsoft SQL Server 2005
-[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with AND condition syntax
-[15:32:59] [WARNING] the parameter 'name' is not affected by a time based blind sql injection with AND condition syntax
-[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked query syntax
-[15:33:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with stacked query syntax
-time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'PmrXn'='PmrXn'
+[hh:mm:59] [INFO] testing time based blind sql injection on parameter 'name' with AND
+condition syntax
+[hh:mm:59] [WARNING] the parameter 'name' is not affected by a time based blind sql
+injection with AND condition syntax
+[hh:mm:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked
+query syntax
+[hh:mm:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with
+stacked query syntax
+time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND
+'PmrXn'='PmrXn'
diff --git a/doc/THANKS b/doc/THANKS
index 3f22f9c27..8b25b4213 100644
--- a/doc/THANKS
+++ b/doc/THANKS
@@ -36,6 +36,7 @@ Giorgio Fedon
Ivan Giacomelli
for reporting a bug
for suggesting a minor enhancement
+ for reviewing the documentation
Davide Guerri
for suggesting an enhancement