mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-10 19:56:36 +03:00
Fix for #4090
parent
5dc89b2b0f
commit
8a7214a72c
4
Usage.md
4
Usage.md
|
@ -2248,7 +2248,7 @@ Switch: `--hpp`
|
|||
|
||||
HTTP parameter pollution (HPP) is a method for bypassing WAF/IPS protection mechanisms (explained [here](https://www.imperva.com/resources/glossary/http-parameter-pollution)) that is particularly effective against ASP/IIS and ASP.NET/IIS platforms. If you suspect that the target is behind such protection, you can try to bypass it by using this switch.
|
||||
|
||||
### Make a through testing for a WAF/IPS protection
|
||||
### Make a thorough testing for a WAF/IPS protection
|
||||
|
||||
Switch: `--identify-waf`
|
||||
|
||||
|
@ -2361,7 +2361,7 @@ $ python sqlmap.py --purge -v 3
|
|||
[...]
|
||||
```
|
||||
|
||||
### Conduct through tests only if positive heuristic(s)
|
||||
### Conduct thorough tests only if positive heuristic(s)
|
||||
|
||||
Switch `--smart`
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user