diff --git a/doc/README.html b/doc/README.html index 723fe96fe..6d01bf3cb 100644 --- a/doc/README.html +++ b/doc/README.html @@ -37,15 +37,16 @@ for the latest version.

5. Usage

6. Disclaimer

@@ -399,6 +400,7 @@ Usage: sqlmap.py [options] Options: --version show program's version number and exit -h, --help show this help message and exit + -v VERBOSE Verbosity level: 0-5 (default 1) Target: At least one of these options has to be specified to set the source to @@ -502,7 +504,6 @@ Options: Miscellaneous: --eta Retrieve each query output length and calculate the estimated time of arrival in real time - -v VERBOSE Verbosity level: 0-5 (default 1) --update Update sqlmap to the latest stable version -s SESSIONFILE Save and resume all data retrieved on a session file --save Save options on a configuration INI file @@ -512,35 +513,9 @@ Options:

-

5.1 Target +

5.1 Output verbosity

-

At least one of these options has to be specified to set the source to get -target urls from.

- -

Target URL

- -

Option: -u or --url

- -

To run sqlmap on a single target URL.

- -

Example on a MySQL 5.0.67 target:

-

-

-
-$ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int.php?id=1"
-
-[...]
-web server operating system: Linux Ubuntu 8.10 (Intrepid Ibex)
-web application technology: PHP 5.2.6, Apache 2.2.9
-back-end DBMS: MySQL >= 5.0.0
-
-
-

- - -

Target URL and verbosity

-

Option: -v

Verbose options can be used to set the verbosity level of output messages. @@ -762,6 +737,33 @@ Content-Type: text/html

+

5.2 Target +

+ +

At least one of these options has to be specified to set the source to get +target urls from.

+ +

Target URL

+ +

Option: -u or --url

+ +

To run sqlmap on a single target URL.

+ +

Example on a MySQL 5.0.67 target:

+

+

+
+$ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int.php?id=1"
+
+[...]
+web server operating system: Linux Ubuntu 8.10 (Intrepid Ibex)
+web application technology: PHP 5.2.6, Apache 2.2.9
+back-end DBMS: MySQL >= 5.0.0
+
+
+

+ +

Parse targets from Burp or WebScarab logs

Option: -l

@@ -903,7 +905,7 @@ evaluated when running sqlmap and overwrite the same options, if set, in the provided configuration file.

-

5.2 Request +

5.3 Request

These options can be used to specify how to connect to the target url.

@@ -1367,7 +1369,7 @@ the HTTP request timed out. The valid value is a float, for instance 10.5 means ten seconds and a half.

-

5.3 Injection +

5.4 Injection

These options can be used to specify which parameters to test for, provide @@ -1573,9 +1575,9 @@ SELECT * FROM users WHERE id=('1') AND 7433=7433 AND ('test'='test') LIMIT 0, 1

-

In this simple example sqlmap could detect the SQL injection and exploit it -without need to provide a custom injection payload, but sometimes on real -world application it is necessary to provide a custom injection payload.

+

In this simple example, sqlmap could detect the SQL injection and exploit +it without need to provide a custom injection payload, but sometimes in +the real world application it is necessary to provide it.

Page comparison

@@ -1799,7 +1801,7 @@ $ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int_refresh.php?id= stability test.

-

5.4 Techniques +

5.5 Techniques

Test for stacked queries (multiple statements) support

@@ -1928,11 +1930,16 @@ $ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" \ [...] back-end DBMS: Microsoft SQL Server 2005 -[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with AND condition syntax -[15:32:59] [WARNING] the parameter 'name' is not affected by a time based blind sql injection with AND condition syntax -[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked query syntax -[15:33:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with stacked query syntax -time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'PmrXn'='PmrXn' +[hh:mm:59] [INFO] testing time based blind sql injection on parameter 'name' with AND +condition syntax +[hh:mm:59] [WARNING] the parameter 'name' is not affected by a time based blind sql +injection with AND condition syntax +[hh:mm:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked +query syntax +[hh:mm:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with +stacked query syntax +time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND +'PmrXn'='PmrXn'

@@ -2159,7 +2166,7 @@ SELECT statement to produce one entry at a time and display it in the page content.

-

5.5 Fingerprint +

5.6 Fingerprint

Extensive database management system fingerprint

@@ -2472,7 +2479,7 @@ parsing library that fetches data from Chip Andrews' SQLSecurity.com site and outputs it to the XML versions file.

-

5.6 Enumeration +

5.7 Enumeration

Banner

@@ -3749,7 +3756,7 @@ column names of the table then asks if the query can return multiple entries and goes on.

-

5.7 File system access +

5.8 File system access

Read a specific file content

@@ -3793,7 +3800,7 @@ inquis:x:1000:100:Bernardo Damele A. G.,,,:/home/inquis:/bin/bash

-

5.8 Operating system access +

5.9 Operating system access

Prompt for an interactive operating system shell

@@ -3831,7 +3838,7 @@ $ exit functionalities of SQL shell in terms of TAB completion and history support.

-

5.9 Miscellaneous +

5.10 Miscellaneous

Estimated time of arrival

diff --git a/doc/README.pdf b/doc/README.pdf index 7d6b45333..49650c621 100644 Binary files a/doc/README.pdf and b/doc/README.pdf differ diff --git a/doc/README.sgml b/doc/README.sgml index 77042e507..c35a2de1f 100644 --- a/doc/README.sgml +++ b/doc/README.sgml @@ -356,6 +356,7 @@ Usage: sqlmap.py [options] Options: --version show program's version number and exit -h, --help show this help message and exit + -v VERBOSE Verbosity level: 0-5 (default 1) Target: At least one of these options has to be specified to set the source to @@ -459,7 +460,6 @@ Options: Miscellaneous: --eta Retrieve each query output length and calculate the estimated time of arrival in real time - -v VERBOSE Verbosity level: 0-5 (default 1) --update Update sqlmap to the latest stable version -s SESSIONFILE Save and resume all data retrieved on a session file --save Save options on a configuration INI file @@ -467,34 +467,7 @@ Options: -Target - -

-At least one of these options has to be specified to set the source to get -target urls from. - -Target URL - -

-Option: -u or --url - -

-To run sqlmap on a single target URL. - -

-Example on a MySQL 5.0.67 target: - - -$ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int.php?id=1" - -[...] -web server operating system: Linux Ubuntu 8.10 (Intrepid Ibex) -web application technology: PHP 5.2.6, Apache 2.2.9 -back-end DBMS: MySQL >= 5.0.0 - - - -Target URL and verbosity +Output verbosity

Option: -v @@ -709,6 +682,33 @@ Content-Type: text/html +Target + +

+At least one of these options has to be specified to set the source to get +target urls from. + +Target URL + +

+Option: -u or --url + +

+To run sqlmap on a single target URL. + +

+Example on a MySQL 5.0.67 target: + + +$ python sqlmap.py -u "http://192.168.1.121/sqlmap/mysql/get_int.php?id=1" + +[...] +web server operating system: Linux Ubuntu 8.10 (Intrepid Ibex) +web application technology: PHP 5.2.6, Apache 2.2.9 +back-end DBMS: MySQL >= 5.0.0 + + + Parse targets from Burp or WebScarab logs

@@ -1513,9 +1513,9 @@ SELECT * FROM users WHERE id=('1') AND 7433=7433 AND ('test'='test') LIMIT 0, 1

-In this simple example sqlmap could detect the SQL injection and exploit it -without need to provide a custom injection payload, but sometimes on real -world application it is necessary to provide a custom injection payload. +In this simple example, sqlmap could detect the SQL injection and exploit +it without need to provide a custom injection payload, but sometimes in +the real world application it is necessary to provide it. Page comparison @@ -1864,11 +1864,16 @@ $ python sqlmap.py -u "http://192.168.123.36/sqlmap/get_str.asp?name=luther" \ [...] back-end DBMS: Microsoft SQL Server 2005 -[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with AND condition syntax -[15:32:59] [WARNING] the parameter 'name' is not affected by a time based blind sql injection with AND condition syntax -[15:32:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked query syntax -[15:33:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with stacked query syntax -time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND 'PmrXn'='PmrXn' +[hh:mm:59] [INFO] testing time based blind sql injection on parameter 'name' with AND +condition syntax +[hh:mm:59] [WARNING] the parameter 'name' is not affected by a time based blind sql +injection with AND condition syntax +[hh:mm:59] [INFO] testing time based blind sql injection on parameter 'name' with stacked +query syntax +[hh:mm:13] [INFO] the parameter 'name' is affected by a time based blind sql injection with +stacked query syntax +time based blind sql injection payload: 'name=luther'; WAITFOR DELAY '0:0:5';-- AND +'PmrXn'='PmrXn' diff --git a/doc/THANKS b/doc/THANKS index 3f22f9c27..8b25b4213 100644 --- a/doc/THANKS +++ b/doc/THANKS @@ -36,6 +36,7 @@ Giorgio Fedon Ivan Giacomelli for reporting a bug for suggesting a minor enhancement + for reviewing the documentation Davide Guerri for suggesting an enhancement