Automatic SQL injection and database takeover tool
Go to file
Bernardo Damele c8f943f5e4 Now, if the back-end dbms type has been identified by the detection engine, skips the fingerprint phase.
Major code refactoring and commenting to detection engine.
Ask user whether or not to proceed to test remaining parameters after an injection point has been identified.
Restore beep at SQL injection find.
Avoid reuse of same variable in DBMS handler code.
Minor adjustment of payloads XML file.
2010-11-30 22:40:25 +00:00
doc Added new switch --union-char to be able to provide the character used in union-test and exploit (default is still NULL, but can be any) 2010-11-19 14:56:20 +00:00
extra foundations for dictionary attack support combined with the sqlmap's password/hash retrieval functionality (--password switch) 2010-11-20 13:14:13 +00:00
lib Now, if the back-end dbms type has been identified by the detection engine, skips the fingerprint phase. 2010-11-30 22:40:25 +00:00
plugins Now, if the back-end dbms type has been identified by the detection engine, skips the fingerprint phase. 2010-11-30 22:40:25 +00:00
shell removed a trailer blank like (cosmetics) 2010-11-24 14:25:16 +00:00
tamper further refactoring (all enumerations are now put into enums.py) 2010-11-08 09:20:02 +00:00
txt more code refactoring 2010-11-23 14:50:47 +00:00
udf Removed duplicate UDFs files 2010-07-20 10:44:27 +00:00
xml Now, if the back-end dbms type has been identified by the detection engine, skips the fingerprint phase. 2010-11-30 22:40:25 +00:00
sqlmap.conf Got rid of unreliable 'ORDER BY' technique to detect UNION query SQL injection, consequently switch --union-tech has gone now. 2010-11-29 17:18:38 +00:00
sqlmap.py Minor code refactoring 2010-10-20 22:09:03 +00:00