From d4b106d891aeced7119248ddd64ba98a1729f504 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Wed, 28 Dec 2016 22:23:50 +0100 Subject: [PATCH] Updated Usage (markdown) --- Usage.md | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/Usage.md b/Usage.md index beca39e..bff3461 100644 --- a/Usage.md +++ b/Usage.md @@ -81,7 +81,8 @@ Options: -p TESTPARAMETER Testable parameter(s) --skip=SKIP Skip testing for given parameter(s) - --skip-static Skip testing parameters that not appear dynamic + --skip-static Skip testing parameters that not appear to be dynamic + --param-exclude=.. Regexp to exclude parameters from testing (e.g. "ses") --dbms=DBMS Force back-end DBMS to this value --dbms-cred=DBMS.. DBMS authentication credentials (user:password) --os=OS Force back-end DBMS operating system to this value @@ -714,7 +715,7 @@ These options can be used to specify which parameters to test for, provide custo ### Testable parameter(s) -Options: `-p` and `--skip` +Options: `-p`, `--skip` and `--param-exclude` By default sqlmap tests all GET parameters and POST parameters. When the value of `--level` is >= **2** it tests also HTTP `Cookie` header values. When this value is >= **3** it tests also HTTP `User-Agent` and HTTP `Referer` header value for SQL injections. It is however possible to manually specify a comma-separated list of parameter(s) that you want sqlmap to test. This will bypass the dependence on value of `--level` too. @@ -724,6 +725,10 @@ In case that user wants to exclude certain parameters from testing, he can use o For instance, to skip testing for HTTP header `User-Agent` and HTTP header `Referer` at `--level=5`, provide `--skip="user-agent,referer"`. +There is also a possibility to exclude certain parameters from testing based on a regular expression run on their names. In those kind of cases user can use option `--param-exclude`. + +For instance, to skip testing for parameters which contain string `token` or `session` in their names, provide `--param-exclude="token|session"`. + #### URI injection point There are special cases when injection point is within the URI itself. sqlmap does not perform any automatic test against URI paths, unless manually pointed to. You have to specify these injection points in the command line by appending an asterisk (`*`) (Note: Havij style `%INJECT HERE%` is also supported) after each URI point that you want sqlmap to test for and exploit a SQL injection.