From 9b450b64c7d4c356cba72049ecda7dc5cdac961d Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Mon, 27 Jan 2020 17:34:13 +0100 Subject: [PATCH] Updated Features (markdown) --- Features.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Features.md b/Features.md index b7ee285..5e7dc94 100644 --- a/Features.md +++ b/Features.md @@ -4,7 +4,7 @@ Features implemented in sqlmap include: ## Generic features -* Full support for **MySQL**, **Oracle**, **PostgreSQL**, **Microsoft SQL Server**, **Microsoft Access**, **IBM DB2**, **SQLite**, **Firebird**, **Sybase**, **SAP MaxDB**, **Informix**, **MariaDB**, **MemSQL**, **TiDB**, **CockroachDB**, **HSQLDB**, **H2**, **MonetDB**, **Apache Derby**, **Vertica**, **Mckoi** and **Presto** database management systems. +* Full support for **MySQL**, **Oracle**, **PostgreSQL**, **Microsoft SQL Server**, **Microsoft Access**, **IBM DB2**, **SQLite**, **Firebird**, **Sybase**, **SAP MaxDB**, **Informix**, **MariaDB**, **MemSQL**, **TiDB**, **CockroachDB**, **HSQLDB**, **H2**, **MonetDB**, **Apache Derby**, **Vertica**, **Mckoi**, **Presto** and **Altibase** database management systems. * Full support for five SQL injection techniques: **boolean-based blind**, **time-based blind**, **error-based**, **UNION query** and **stacked queries**. * Support to **directly connect to the database** without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name. * It is possible to provide a single target URL, get the list of targets from [Burp proxy](http://portswigger.net/suite/) or [WebScarab proxy](http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project) requests log files, get the whole HTTP request from a text file or get the list of targets by providing sqlmap with a Google dork which queries [Google](http://www.google.com) search engine and parses its results page. You can also define a regular-expression based scope that is used to identify which of the parsed addresses to test.