minor fix

Bernardo Damele 2012-07-15 22:09:33 +01:00
parent 4bf123d44e
commit 36d1833e0c

16
FAQ.md

@ -106,9 +106,9 @@ table containing password hashes.
Question(s): Question(s):
[#1](http://thread.gmane.org/gmane.comp.security.sqlmap/714) [#1](http://thread.gmane.org/gmane.comp.security.sqlmap/714)
## What is `-``-text-only` switch? ## What is `--text-only` switch?
Switch `-``-text-only` is used for removing non-textual data (tags, Switch `--text-only` is used for removing non-textual data (tags,
javascripts, styles,...) from the retrieved page content to further javascripts, styles,...) from the retrieved page content to further
improve detection capabilities. improve detection capabilities.
@ -120,16 +120,16 @@ the site normally?
There are few IDSes that filter out all sqlmap requests based on default There are few IDSes that filter out all sqlmap requests based on default
User-Agent HTTP header used (e.g. `"User-agent: sqlmap/1.0-dev"`). To prevent this User-Agent HTTP header used (e.g. `"User-agent: sqlmap/1.0-dev"`). To prevent this
kind of situations you are advised to use switch `-``-random-agent`. kind of situations you are advised to use switch `--random-agent`.
If you are getting those kind of messages for all targets then you If you are getting those kind of messages for all targets then you
most probably need to properly set up your proxy settings (switches `-``-proxy` most probably need to properly set up your proxy settings (switches `--proxy`
and/or `-``-ignore-proxy`) and/or `--ignore-proxy`)
Question(s): Question(s):
[#1](http://thread.gmane.org/gmane.comp.security.sqlmap/1241) [#1](http://thread.gmane.org/gmane.comp.security.sqlmap/1241)
## Is it possible to use `"INSERT/UPDATE"` SQL commands via `-``-sql-query` ## Is it possible to use `"INSERT/UPDATE"` SQL commands via `--sql-query`
and/or `-``-sql-shell`? and/or `--sql-shell`?
It is possible to use those commands, but only if the stacked injection is supported It is possible to use those commands, but only if the stacked injection is supported
by the vulnerable target. In vast majority of cases affected DBMSes by these kind of by the vulnerable target. In vast majority of cases affected DBMSes by these kind of
@ -156,4 +156,4 @@ SQL injection attacks. sqlmap goes several steps further and never claims
an injection point without making through tests if it can be exploited at the first place. an injection point without making through tests if it can be exploited at the first place.
Question(s): Question(s):
[#1](http://thread.gmane.org/gmane.comp.security.sqlmap/970) [#1](http://thread.gmane.org/gmane.comp.security.sqlmap/970)