diff --git a/doc/README.html b/doc/README.html index 2a0b33521..559fe37fa 100644 --- a/doc/README.html +++ b/doc/README.html @@ -247,7 +247,7 @@ and the session user privileges.

You can watch several demo videos, they are hosted on -YouTube and linked +YouTube and linked from here.

@@ -276,13 +276,12 @@ blind SQL injection. targets from Burp proxy requests log file or -WebScarab proxy -conversations/ folder, get the whole HTTP request from a text -file or get the list of targets by providing sqlmap with a Google dork -which queries -Google search engine and -parses its results page. You can also define a regular-expression based -scope that is used to identify which of the parsed addresses to test. +WebScarab proxy conversations/ folder, get the whole HTTP +request from a text file or get the list of targets by providing sqlmap +with a Google dork which queries +Google search engine and parses its results page. You can also +define a regular-expression based scope that is used to identify which of +the parsed addresses to test.
  • Automatically tests all provided GET parameters, POST parameters, HTTP Cookie header values and HTTP @@ -457,10 +456,8 @@ Metasploit's getsystem command which include, among others, the kitrap0d technique ( MS10-015) or via -Windows Access Tokens kidnapping by using either Meterpreter's -incognito extension or Churrasco ( -MS09-012) stand-alone executable -as per user's choice. +Windows Access Tokens kidnapping by using Meterpreter's +incognito extension.
  • Support to access (read/add/delete) Windows registry hives.
  • @@ -538,10 +535,8 @@ contains the working copy from the Subversion repository updated at the time the sqlmap new version has been released.
  • The Debian and Red Hat installation packages (deb and rpm) are compliant with the Linux distributions' packaging guidelines. This implies -that they do not support the update features and do not include -third-party softwares Churrasco (used to perform Windows token kidnapping, -see below) and UPX (used to pack the Metasploit payload stager in some -cases, see below).
  • +that they do not support the update features and do not include UPX (used +to pack the Metasploit payload stager in some cases, see below).
  • The Windows binary package (exe) can't update itself and does not support the takeover out-of-band features because they rely on Metasploit's msfcli which is not available for Windows.
  • @@ -694,7 +689,7 @@ Options: --os-pwn Prompt for an out-of-band shell, meterpreter or VNC --os-smbrelay One click prompt for an OOB shell, meterpreter or VNC --os-bof Stored procedure buffer overflow exploitation - --priv-esc User priv escalation by abusing Windows access tokens + --priv-esc Database process' user privilege escalation --msf-path=MSFPATH Local path where Metasploit Framework 3 is installed --tmp-path=TMPPATH Remote absolute path of temporary files directory @@ -4968,11 +4963,8 @@ via Metasploit's getsystem command which include, among others, the kitrap0d technique ( MS10-015) or via -Windows Access Tokens kidnapping by using either Meterpreter's -incognito extension or -Churrasco -( -MS09-012) stand-alone executable as per user's choice.

    +Windows Access Tokens kidnapping by using Meterpreter's +incognito extension.

    Example on a Microsoft SQL Server 2005 Service Pack 0 running as NETWORK SERVICE on the target:

    @@ -5023,9 +5015,7 @@ which payload encoding do you want to use? [hh:mm:53] [INFO] creation in progress ..... done [hh:mm:58] [INFO] compression in progress . done [hh:mm:59] [INFO] uploading payload stager to 'C:/WINDOWS/Temp/tmpmqyws.exe' -do you want sqlmap to upload Churrasco and call the Metasploit payload stager as its -argument so that it will be started as SYSTEM? [y/N] -[hh:mm:22] [INFO] running Metasploit Framework 3 command line interface locally, wait.. +[hh:mm:05] [INFO] running Metasploit Framework 3 command line interface locally, wait.. [*] Please wait while we load the module tree... [*] Started reverse handler on 172.16.213.1:44780 [*] Starting the payload handler... @@ -5144,11 +5134,9 @@ send the NTLM session hash when connecting to a SMB service [hh:mm:16] [INFO] which is the back-end DBMS address? [172.16.213.131] 172.16.213.131 [hh:mm:16] [INFO] which remote port numer do you want to use? [4907] 4907 [hh:mm:16] [INFO] which payload do you want to use? -[1] Reflective Meterpreter (default) -[2] PatchUp Meterpreter (only from Metasploit development revision 6742) -[3] Shell -[4] Reflective VNC -[5] PatchUp VNC (only from Metasploit development revision 6742) +[1] Meterpreter (default) +[2] Shell +[3] VNC > 1 [hh:mm:16] [INFO] which SMB port do you want to use? [1] 139/TCP (default) diff --git a/doc/README.pdf b/doc/README.pdf index e2910ff5c..9ab44bd6c 100644 Binary files a/doc/README.pdf and b/doc/README.pdf differ diff --git a/doc/README.sgml b/doc/README.sgml index e23358d6d..3c8d15b23 100644 --- a/doc/README.sgml +++ b/doc/README.sgml @@ -407,11 +407,8 @@ name="kitrap0d"> technique () or via by using either Meterpreter's -incognito extension or Churrasco () stand-alone executable -as per user's choice. +name="Windows Access Tokens kidnapping"> by using Meterpreter's +incognito extension. Support to access (read/add/delete) Windows registry hives. @@ -484,10 +481,8 @@ contains the working copy from the Subversion repository updated at the time the sqlmap new version has been released. The Debian and Red Hat installation packages (deb and rpm) are compliant with the Linux distributions' packaging guidelines. This implies -that they do not support the update features and do not include -third-party softwares Churrasco (used to perform Windows token kidnapping, -see below) and UPX (used to pack the Metasploit payload stager in some -cases, see below). +that they do not support the update features and do not include UPX (used +to pack the Metasploit payload stager in some cases, see below). The Windows binary package (exe) can't update itself and does not support the takeover out-of-band features because they rely on Metasploit's msfcli which is not available for Windows. @@ -4872,12 +4867,9 @@ name="kitrap0d"> technique () or via by using either Meterpreter's +name="Windows Access Tokens kidnapping"> by using Meterpreter's extension or -() stand-alone executable as per user's choice. +name="incognito"> extension.

    Example on a Microsoft SQL Server 2005 Service Pack 0 running as @@ -4928,9 +4920,7 @@ which payload encoding do you want to use? [hh:mm:53] [INFO] creation in progress ..... done [hh:mm:58] [INFO] compression in progress . done [hh:mm:59] [INFO] uploading payload stager to 'C:/WINDOWS/Temp/tmpmqyws.exe' -do you want sqlmap to upload Churrasco and call the Metasploit payload stager as its -argument so that it will be started as SYSTEM? [y/N] -[hh:mm:22] [INFO] running Metasploit Framework 3 command line interface locally, wait.. +[hh:mm:05] [INFO] running Metasploit Framework 3 command line interface locally, wait.. [*] Please wait while we load the module tree... [*] Started reverse handler on 172.16.213.1:44780 [*] Starting the payload handler...