Updated Usage (markdown)

stamparm 2013-03-15 13:05:46 -07:00
parent 6f95498757
commit 8973e4bec6

@ -251,14 +251,27 @@ At least one of these options has to be provided.
Option: `-d` Option: `-d`
Run sqlmap against a single database instance. This option requires a connection string in form `DBMS://USER:PASSWORD@DBMS_IP:DBMS_PORT/DATABASE_NAME` (for DBMSes like MySQL, Oracle, Microsoft SQL Server, PostgreSQL, etc.) or `DBMS://DATABASE_FILEPATH` (for DBMSes like SQLite, Microsoft Access, Firebird, etc.) Run sqlmap against a single database instance. This option accepts a connection string in one of following forms:
* `DBMS://USER:PASSWORD@DBMS_IP:DBMS_PORT/DATABASE_NAME` (MySQL, Oracle, Microsoft SQL Server, PostgreSQL, etc.)
* `DBMS://DATABASE_FILEPATH` (SQLite, Microsoft Access, Firebird, etc.)
For example:
python sqlmap.py -d "mysql://admin:admin@192.168.21.17:3306/testdb" -f --banner --dbs --users
### Target URL ### Target URL
Option: `-u` or `--url` Option: `-u` or `--url`
Run sqlmap against a single target URL. This option requires a target URL in form Run sqlmap against a single target URL. This option requires a target URL in following form:
`http(s)://targeturl[:port]/[...]`.
`http(s)://targeturl[:port]/[...]`
For example:
python sqlmap.py -u "http://www.target.com/vuln.php?id=1" -f --banner --dbs --users
### Parse targets from Burp or WebScarab proxy logs ### Parse targets from Burp or WebScarab proxy logs
@ -288,8 +301,8 @@ One of the possibilities of sqlmap is loading of complete HTTP request from a te
Sample content of a HTTP request file provided as an argument to this option: Sample content of a HTTP request file provided as an argument to this option:
POST /sqlmap/mysql/post_int.php HTTP/1.1 POST /vuln.php HTTP/1.1
Host: 192.168.136.131 Host: www.target.com
User-Agent: Mozilla/4.0 User-Agent: Mozilla/4.0
id=1 id=1
@ -302,6 +315,10 @@ It is also possible to test and inject on `GET` parameters on the results of you
This option makes sqlmap negotiate with the search engine its session cookie to be able to perform a search, then sqlmap will retrieve Google first 100 results for the Google dork expression with `GET` parameters asking you if you want to test and inject on each possible affected URL. This option makes sqlmap negotiate with the search engine its session cookie to be able to perform a search, then sqlmap will retrieve Google first 100 results for the Google dork expression with `GET` parameters asking you if you want to test and inject on each possible affected URL.
For example:
python sqlmap.py -g "inurl:\".php?id=1\""
### Load options from a configuration INI file ### Load options from a configuration INI file
Option: `-c` Option: `-c`
@ -320,6 +337,20 @@ Option: `--data`
By default the HTTP method used to perform HTTP requests is `GET`, but you can implicitly change it to `POST` by providing the data to be sent in the `POST` requests. Such data, being those parameters, are tested for SQL injection as well as any provided `GET` parameters. By default the HTTP method used to perform HTTP requests is `GET`, but you can implicitly change it to `POST` by providing the data to be sent in the `POST` requests. Such data, being those parameters, are tested for SQL injection as well as any provided `GET` parameters.
For example:
python sqlmap.py -u "http://www.target.com/vuln.php" --data="id=1" -f --banner --dbs --users
### Parameter splitting character
Option: `--param-del`
There are cases when default parameter delimiter (e.g. `&` in GET and POST data) needs to be overwritten for sqlmap to be able to properly split and process each parameter separately.
For example:
python sqlmap.py -u "http://www.target.com/vuln.php" --data="query=foobar;id=1" --param-del=";" -f --banner --dbs --users
### HTTP `Cookie` header ### HTTP `Cookie` header
Switches: `--cookie` and `--drop-set-cookie` Switches: `--cookie` and `--drop-set-cookie`