From f62d0b8634fa34b947fcc3471acba635ebb87b72 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Mon, 27 Jan 2020 22:40:25 +0100 Subject: [PATCH] Patch related to #4089 --- Usage.md | 7 ------- 1 file changed, 7 deletions(-) diff --git a/Usage.md b/Usage.md index 6e1a735..84a722c 100644 --- a/Usage.md +++ b/Usage.md @@ -16,7 +16,6 @@ Options: -d DIRECT Connection string for direct database connection -u URL, --url=URL Target URL (e.g. "http://www.site.com/vuln.php?id=1") -l LOGFILE Parse target(s) from Burp or WebScarab proxy log file - -x SITEMAPURL Parse target(s) from remote sitemap(.xml) file -m BULKFILE Scan multiple targets given in a textual file -r REQUESTFILE Load HTTP request from a file -g GOOGLEDORK Process Google dork results as target URLs @@ -321,12 +320,6 @@ Option: `-l` Rather than providing a single target URL, it is possible to test and inject against HTTP requests proxied through [Burp proxy](http://portswigger.net/suite/) or [WebScarab proxy](http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project). This option requires an argument which is the proxy's HTTP requests log file. -### Parse targets from remote sitemap(.xml) file - -Option: `-x` - -A sitemap is a file where web admins can list the web page locations of their site to tell search engines about the site content's organization. You can provide a sitemap's location to sqlmap by using option `-x` (e.g. `-x http://www.target.com/sitemap.xml`) so it could find usable target URLs for scanning purposes. - ### Scan multiple targets enlisted in a given textual file Option: `-m`