Skip to content

Commit 9840a04

Browse files
committed
more doc updates
1 parent fbf8e7f commit 9840a04

File tree

3 files changed

+46
-45
lines changed

3 files changed

+46
-45
lines changed

doc/README.html

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -105,9 +105,9 @@ <H2><A NAME="ss1.1">1.1</A> <A HREF="#toc1.1">Requirements</A>
105105
Windows users can download and install the Python setup-ready installer
106106
for x86, AMD64 and Itanium too.</P>
107107
<P>sqlmap relies on the
108-
<A HREF="http://metasploit.com/framework/">Metasploit Framework</A> for some of its post-exploitation takeover
108+
<A HREF="http://metasploit.com">Metasploit Framework</A> for some of its post-exploitation takeover
109109
features. You need to grab a copy of it from the
110-
<A HREF="http://metasploit.com/framework/download/">download</A>
110+
<A HREF="http://metasploit.com/download/">download</A>
111111
page - the required version is <B>3.5</B> or higher.
112112
For the ICMP tunneling out-of-band takeover technique, sqlmap requires
113113
<A HREF="http://corelabs.coresecurity.com/index.php?module=Wiki&amp;action=view&amp;type=tool&amp;name=Impacket">Impacket</A> library too.</P>
@@ -418,7 +418,7 @@ <H2><A NAME="ss2.1">2.1</A> <A HREF="#toc2.1">Generic features</A>
418418
message to the user.
419419
</LI>
420420
<LI>Integration with other IT security open source projects,
421-
<A HREF="http://metasploit.com/framework/">Metasploit</A> and
421+
<A HREF="http://metasploit.com">Metasploit</A> and
422422
<A HREF="http://w3af.sourceforge.net/">w3af</A>.</LI>
423423
</UL>
424424
</P>
@@ -727,7 +727,7 @@ <H2><A NAME="ss3.4">3.4</A> <A HREF="#toc3.4">2008</A>
727727
<LI><B>October 20</B>, sqlmap first point release, <B>0.6.1</B>, goes
728728
public. This includes minor bug fixes and the first contact between the
729729
tool and
730-
<A HREF="http://metasploit.com/framework">Metasploit</A>:
730+
<A HREF="http://metasploit.com">Metasploit</A>:
731731
an auxiliary module to launch sqlmap from within Metasploit Framework.
732732
The
733733
<A HREF="https://svn.sqlmap.org/sqlmap/trunk/sqlmap/">subversion development repository</A> goes public again.
@@ -1445,16 +1445,16 @@ <H3>Output prediction</H3>
14451445
<P>Switch: <CODE>-</CODE><CODE>-predict-output</CODE></P>
14461446

14471447
<P>This switch is used in inference algorithm for sequential statistical
1448-
prediction of characters of value being retrieved. Based on items given in
1449-
<CODE>txt/common-outputs.txt</CODE> together with the knowledge of current
1450-
enumeration used statistical table with the most promising values is being
1451-
built. In case that the value can be found among the common output values,
1452-
as the process progresses, subsequent character tables are being narrowed
1453-
more and more. If used in combination with retrieval of common DBMS
1454-
entities, as with system table names and privileges, speed up is
1455-
significant. Of course, you can edit the common outputs file according to
1456-
your needs if, for instance, you notice common patterns in database table
1457-
names or similar.</P>
1448+
prediction of characters of value being retrieved. Statistical table with
1449+
the most promising character values is being built based on items given in
1450+
<CODE>txt/common-outputs.txt</CODE> combined with the knowledge of current
1451+
enumeration used. In case that the value can be found among the common
1452+
output values, as the process progresses, subsequent character tables are
1453+
being narrowed more and more. If used in combination with retrieval of
1454+
common DBMS entities, as with system table names and privileges, speed up
1455+
is significant. Of course, you can edit the common outputs file according
1456+
to your needs if, for instance, you notice common patterns in database
1457+
table names or similar.</P>
14581458

14591459
<P>Note that this switch is not compatible with <CODE>-</CODE><CODE>-threads</CODE>
14601460
switch.</P>
@@ -1507,9 +1507,8 @@ <H3>Concurrent HTTP(S) requests</H3>
15071507
when that character is retrieved - it takes up to 7 HTTP(S) requests with
15081508
the bisection algorithm implemented in sqlmap.</P>
15091509

1510-
<P>Note that the multi-threading switch does not affect any other SQL
1511-
injection technique. The maximum number of concurrent requests is set to
1512-
<B>10</B> for performance and site reliability reasons.</P>
1510+
<P>The maximum number of concurrent requests is set to <B>10</B> for
1511+
performance and site reliability reasons.</P>
15131512

15141513
<P>Note that this switch is not compatible with
15151514
<CODE>-</CODE><CODE>-predict-output</CODE> switch.</P>
@@ -1682,7 +1681,7 @@ <H3>Tamper injection data</H3>
16821681
from lib.core.enums import PRIORITY
16831682

16841683
# Define which is the order of application of tamper scripts against the payload
1685-
__priority__ = PRIORITY.HIGHEST
1684+
__priority__ = PRIORITY.NORMAL
16861685

16871686
def tamper(payload):
16881687
'''
@@ -1691,8 +1690,9 @@ <H3>Tamper injection data</H3>
16911690

16921691
retVal = payload
16931692

1694-
# your code to tamper the original payload (retVal)
1693+
# your code to tamper the original payload
16951694

1695+
# return the tampered payload
16961696
return retVal
16971697
</PRE>
16981698
</CODE></BLOCKQUOTE>
@@ -1701,12 +1701,12 @@ <H3>Tamper injection data</H3>
17011701
<P>You can check valid and usable tamper scripts in the <CODE>tamper/</CODE>
17021702
directory.</P>
17031703

1704-
<P>Example against a MySQL target assuming <CODE>&gt;</CODE> character, spaces and
1705-
<CODE>SELECT</CODE> string are banned:</P>
1704+
<P>Example against a MySQL target assuming that <CODE>&gt;</CODE> character,
1705+
spaces and capital <CODE>SELECT</CODE> string are banned:</P>
17061706
<P>
17071707
<BLOCKQUOTE><CODE>
17081708
<PRE>
1709-
$ python sqlmap.py -u "http://debiandev/sqlmap/mysql/get_int.php?id=1" --tamper \
1709+
$ python sqlmap.py -u "http://192.168.136.131/sqlmap/mysql/get_int.php?id=1" --tamper \
17101710
tamper/between.py,tamper/randomcase.py,tamper/space2comment.py -v 3
17111711

17121712
[hh:mm:03] [DEBUG] cleaning up configuration parameters
@@ -1816,7 +1816,7 @@ <H3>Page comparison</H3>
18161816
This way the distinction will be based upon string presence or regular
18171817
expression match.</P>
18181818

1819-
<P>In cases with lot of active (e.g. scripts, embeds, etc.) content in the
1819+
<P>In cases with lot of active content (e.g. scripts, embeds, etc.) in the
18201820
HTTP responses' body, you can filter pages (<CODE>-</CODE><CODE>-text-only</CODE>
18211821
switch) just for their textual content. This way, in a good number of
18221822
cases, you can automatically tune the detection engine.</P>
@@ -2987,7 +2987,7 @@ <H3>Replicate dumped data into a sqlite3 database</H3>
29872987

29882988
<P>You can then use sqlmap itself to read and query the locally created
29892989
SQLite 3 file. For instance, <CODE>python sqlmap.py -d
2990-
sqlite:///tmp/sqlmap/output/debiandev/dump/testdb.sqlite3 --table</CODE>.</P>
2990+
sqlite:///tmp/sqlmap/output/192.168.136.131/dump/testdb.sqlite3 --table</CODE>.</P>
29912991

29922992

29932993
<H3>Simple wizard interface for beginner users</H3>

doc/README.pdf

-96 Bytes
Binary file not shown.

doc/README.sgml

Lines changed: 22 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,10 @@ it packaged in their formats and ready to be installed.
4040
Windows users can download and install the Python setup-ready installer
4141
for x86, AMD64 and Itanium too.
4242

43-
sqlmap relies on the <htmlurl url="http://metasploit.com/framework/"
43+
sqlmap relies on the <htmlurl url="http://metasploit.com"
4444
name="Metasploit Framework"> for some of its post-exploitation takeover
4545
features. You need to grab a copy of it from the
46-
<htmlurl url="http://metasploit.com/framework/download/" name="download">
46+
<htmlurl url="http://metasploit.com/download/" name="download">
4747
page - the required version is <bf>3.5</bf> or higher.
4848
For the ICMP tunneling out-of-band takeover technique, sqlmap requires
4949
<htmlurl url="http://corelabs.coresecurity.com/index.php?module=Wiki&amp;action=view&amp;type=tool&amp;name=Impacket"
@@ -346,7 +346,7 @@ subversion repository.
346346
message to the user.
347347

348348
<item>Integration with other IT security open source projects,
349-
<htmlurl url="http://metasploit.com/framework/" name="Metasploit"> and <htmlurl
349+
<htmlurl url="http://metasploit.com" name="Metasploit"> and <htmlurl
350350
url="http://w3af.sourceforge.net/" name="w3af">.
351351
</itemize>
352352

@@ -650,7 +650,7 @@ release only.
650650

651651
<item><bf>October 20</bf>, sqlmap first point release, <bf>0.6.1</bf>, goes
652652
public. This includes minor bug fixes and the first contact between the
653-
tool and <htmlurl url="http://metasploit.com/framework" name="Metasploit">:
653+
tool and <htmlurl url="http://metasploit.com" name="Metasploit">:
654654
an auxiliary module to launch sqlmap from within Metasploit Framework.
655655
The <htmlurl url="https://svn.sqlmap.org/sqlmap/trunk/sqlmap/"
656656
name="subversion development repository"> goes public again.
@@ -1403,16 +1403,16 @@ Switch: <tt>-</tt><tt>-predict-output</tt>
14031403

14041404
<p>
14051405
This switch is used in inference algorithm for sequential statistical
1406-
prediction of characters of value being retrieved. Based on items given in
1407-
<tt>txt/common-outputs.txt</tt> together with the knowledge of current
1408-
enumeration used statistical table with the most promising values is being
1409-
built. In case that the value can be found among the common output values,
1410-
as the process progresses, subsequent character tables are being narrowed
1411-
more and more. If used in combination with retrieval of common DBMS
1412-
entities, as with system table names and privileges, speed up is
1413-
significant. Of course, you can edit the common outputs file according to
1414-
your needs if, for instance, you notice common patterns in database table
1415-
names or similar.
1406+
prediction of characters of value being retrieved. Statistical table with
1407+
the most promising character values is being built based on items given in
1408+
<tt>txt/common-outputs.txt</tt> combined with the knowledge of current
1409+
enumeration used. In case that the value can be found among the common
1410+
output values, as the process progresses, subsequent character tables are
1411+
being narrowed more and more. If used in combination with retrieval of
1412+
common DBMS entities, as with system table names and privileges, speed up
1413+
is significant. Of course, you can edit the common outputs file according
1414+
to your needs if, for instance, you notice common patterns in database
1415+
table names or similar.
14161416

14171417
<p>
14181418
Note that this switch is not compatible with <tt>-</tt><tt>-threads</tt>
@@ -1666,7 +1666,7 @@ The format of a valid tamper script is as follows:
16661666
from lib.core.enums import PRIORITY
16671667

16681668
# Define which is the order of application of tamper scripts against the payload
1669-
__priority__ = PRIORITY.HIGHEST
1669+
__priority__ = PRIORITY.NORMAL
16701670

16711671
def tamper(payload):
16721672
'''
@@ -1675,8 +1675,9 @@ def tamper(payload):
16751675

16761676
retVal = payload
16771677

1678-
# your code to tamper the original payload (retVal)
1678+
# your code to tamper the original payload
16791679

1680+
# return the tampered payload
16801681
return retVal
16811682
</verb></tscreen>
16821683

@@ -1685,11 +1686,11 @@ You can check valid and usable tamper scripts in the <tt>tamper/</tt>
16851686
directory.
16861687

16871688
<p>
1688-
Example against a MySQL target assuming <tt>&gt;</tt> character, spaces and
1689-
<tt>SELECT</tt> string are banned:
1689+
Example against a MySQL target assuming that <tt>&gt;</tt> character,
1690+
spaces and capital <tt>SELECT</tt> string are banned:
16901691

16911692
<tscreen><verb>
1692-
$ python sqlmap.py -u "http://debiandev/sqlmap/mysql/get_int.php?id=1" --tamper \
1693+
$ python sqlmap.py -u "http://192.168.136.131/sqlmap/mysql/get_int.php?id=1" --tamper \
16931694
tamper/between.py,tamper/randomcase.py,tamper/space2comment.py -v 3
16941695

16951696
[hh:mm:03] [DEBUG] cleaning up configuration parameters
@@ -1809,7 +1810,7 @@ This way the distinction will be based upon string presence or regular
18091810
expression match.
18101811

18111812
<p>
1812-
In cases with lot of active (e.g. scripts, embeds, etc.) content in the
1813+
In cases with lot of active content (e.g. scripts, embeds, etc.) in the
18131814
HTTP responses' body, you can filter pages (<tt>-</tt><tt>-text-only</tt>
18141815
switch) just for their textual content. This way, in a good number of
18151816
cases, you can automatically tune the detection engine.
@@ -3116,7 +3117,7 @@ a <tt>&lt;DB_NAME&gt;/&lt;TABLE_NAME&gt;.csv</tt> file into
31163117
<p>
31173118
You can then use sqlmap itself to read and query the locally created
31183119
SQLite 3 file. For instance, <tt>python sqlmap.py -d
3119-
sqlite:///tmp/sqlmap/output/debiandev/dump/testdb.sqlite3 --table</tt>.
3120+
sqlite:///tmp/sqlmap/output/192.168.136.131/dump/testdb.sqlite3 --table</tt>.
31203121

31213122

31223123
<sect2>Simple wizard interface for beginner users

0 commit comments

Comments
 (0)