fixed URLs for third-party libs

Bernardo Damele 2013-09-24 20:15:22 +01:00
parent ecd5c469a7
commit 89061205f2
2 changed files with 10 additions and 8 deletions

@ -2,19 +2,20 @@
sqlmap is developed in [Python](http://www.python.org), a dynamic, object-oriented, interpreted programming language freely available from [http://python.org/download/](http://python.org/download/). This makes sqlmap a cross-platform application which is independant of the operating system. sqlmap requires Python version **2.6.x** or **2.7.x**. To make it even easier, many GNU/Linux distributions come out of the box with Python installed. Other Unixes and Mac OSX also provide Python packaged and ready to be installed. Windows users can download and install the Python installer for x86, AMD64 and Itanium.
sqlmap relies on the [Metasploit Framework](http://metasploit.com) for some of its post-exploitation takeover features. You can grab a copy of the framework from the [download](http://metasploit.com/download/) page - the required version is **3.5** or higher. For the ICMP tunneling out-of-band takeover technique, sqlmap requires the [Impacket](http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=tool&name=Impacket) library too.
sqlmap relies on the [Metasploit Framework](http://metasploit.com) for some of its post-exploitation takeover features. You can grab a copy of the framework from the [download](http://metasploit.com/download/) page - the required version is **3.5** or higher. For the ICMP tunneling out-of-band takeover technique, sqlmap requires the [Impacket](https://code.google.com/p/impacket/) library too.
If you are willing to connect directly to a database server (switch `-d`), without passing through the web application, you need to install Python bindings for the database management system that you are going to attack:
* DB2: [python ibm-db](https://code.google.com/p/ibm-db/)
* Firebird: [python-kinterbasdb](http://kinterbasdb.sourceforge.net/)
* Microsoft Access: [python-pyodbc](http://pyodbc.googlecode.com/)
* Microsoft Access: [python-pyodbc](https://code.google.com/p/pyodbc/)
* Microsoft SQL Server: [python-pymssql](http://code.google.com/p/pymssql/)
* MySQL: [python pymysql](https://github.com/petehunt/PyMySQL/)
* MySQL: [python pymysql](https://github.com/PyMySQL/PyMySQL/)
* Oracle: [python cx_Oracle](http://cx-oracle.sourceforge.net/)
* PostgreSQL: [python-psycopg2](http://initd.org/psycopg/)
* SQLite: [python-pysqlite2](http://pysqlite.googlecode.com/)
* SQLite: [python-pysqlite2](https://code.google.com/p/pysqlite/)
* Sybase: [python-pymssql](http://code.google.com/p/pymssql/)
If you plan to attack a web application behind a NTLM authentication you'll need to install [python-ntlm](http://code.google.com/p/python-ntlm/) library.
Optionally, if you are running sqlmap on Windows, you may wish to install the [PyReadline](http://ipython.scipy.org/moin/PyReadline/Intro) library in order to take advantage of the sqlmap TAB completion and history support features in the SQL shell and OS shell. Note that these functionalities are available natively via the standard Python [readline](http://docs.python.org/library/readline.html) library on other operating systems.
Optionally, if you are running sqlmap on Windows, you may wish to install the [PyReadline](http://ipython.scipy.org/moin/PyReadline/Intro) library in order to take advantage of the sqlmap TAB completion and history support features in the SQL shell and OS shell. Note that these functionalities are available natively via the standard Python [readline](http://docs.python.org/library/readline.html) library on other operating systems.

@ -43,11 +43,12 @@ These listed are libraries and tools not entirely developed by sqlmap developers
| [Metasploit Framework](http://www.metasploit.com) | BSD | Used for OS takeover features | --os-pwn, --os-bof, --os-smbshell |
| [PyReadline](http://ipython.scipy.org/moin/PyReadline/Intro) | BSD | Used for TAB autocomplete and history | --os-shell and --sql-shell |
| [python cx_Oracle](http://cx-oracle.sourceforge.net/) | BSD | Connector for Oracle | -d |
| [python ibm-db](https://code.google.com/p/ibm-db/) | Apache | Connector for DB2 | -d |
| [python-impacket](http://code.google.com/p/impacket/) | BSD | Used for OS takeover feature via icmpsh | --os-pwn |
| [python-kinterbasdb](http://kinterbasdb.sourceforge.net/) | BSD | Connector for Firebird | -d |
| [python-ntlm](http://code.google.com/p/python-ntlm/) | LGPL | Used when the site requires NTLM authentication | --auth-type |
| [python-psycopg2](http://initd.org/psycopg/) | LGPL | Connector for PostgreSQL | -d |
| [python-pyodbc](http://pyodbc.googlecode.com/) | MIT | Connector for Microsoft Access | -d |
| [python-pymssql](http://pymssql.sourceforge.net/) | LGPL | Connector for MS SQL Server | -d |
| [python-pyodbc](https://code.google.com/p/pyodbc/) | MIT | Connector for Microsoft Access | -d |
| [python-pymssql](http://pymssql.sourceforge.net/) | LGPL | Connector for Microsoft SQL Server | -d |
| [python pymysql](http://code.google.com/p/pymysql/) | MIT | Connector for MySQL | -d |
| [python-pysqlite2](http://pysqlite.googlecode.com/) | MIT | Connector for SQLite 2 | -d |
| [python-pysqlite2](https://code.google.com/p/pysqlite/) | MIT | Connector for SQLite 2 | -d |