Skip to content

Commit b50a228

Browse files
committed
Minor layout adjustments
1 parent 506403d commit b50a228

File tree

4 files changed

+31
-8
lines changed

4 files changed

+31
-8
lines changed

doc/README.sgml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -623,7 +623,7 @@ Options:
623623
--dest-file=DFILE Back-end DBMS absolute filepath to write to
624624

625625
Operating system access:
626-
This option can be used to access the back-end database management
626+
These options can be used to access the back-end database management
627627
system underlying operating system.
628628

629629
--os-cmd=OSCMD Execute an operating system command
@@ -636,7 +636,7 @@ Options:
636636
--tmp-path=TMPPATH Remote absolute path of temporary files directory
637637

638638
Windows registry access:
639-
This option can be used to access the back-end database management
639+
These options can be used to access the back-end database management
640640
system Windows registry.
641641

642642
--reg-read Read a Windows registry key value

lib/parse/cmdline.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -327,8 +327,8 @@ def cmdLineParser():
327327
"write to")
328328

329329
# Takeover options
330-
takeover = OptionGroup(parser, "Operating system access", "This "
331-
"option can be used to access the back-end "
330+
takeover = OptionGroup(parser, "Operating system access", "These "
331+
"options can be used to access the back-end "
332332
"database management system underlying "
333333
"operating system.")
334334

@@ -364,8 +364,8 @@ def cmdLineParser():
364364
"directory")
365365

366366
# Windows registry options
367-
windows = OptionGroup(parser, "Windows registry access", "This "
368-
"option can be used to access the back-end "
367+
windows = OptionGroup(parser, "Windows registry access", "These "
368+
"options can be used to access the back-end "
369369
"database management system Windows "
370370
"registry.")
371371

lib/takeover/registry.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ def __initVars(self, regKey, regValue, regType=None, regData=None, parse=False):
4242

4343
self.__randStr = randomStr(lowercase=True)
4444
self.__batPathRemote = "%s/tmpr%s.bat" % (conf.tmpPath, self.__randStr)
45-
self.__batPathLocal = os.path.join(conf.outputPath, "tmpr%s%s.bat" % (self.__operation, self.__randStr))
45+
self.__batPathLocal = os.path.join(conf.outputPath, "tmpr%s.bat" % self.__randStr)
4646

4747
if parse:
4848
readParse = "FOR /F \"tokens=2* delims==\" %%A IN ('REG QUERY \"" + self.__regKey + "\" /v \"" + self.__regValue + "\"') DO SET value=%%A\r\nECHO %value%\r\n"

sqlmap.conf

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
# At least one of these options has to be specified to set the source to
2+
# get target urls from.
13
[Target]
24

35
# Target URL.
@@ -21,6 +23,8 @@ requestFile =
2123
# Example: +ext:php +inurl:"&id=" +intext:"powered by "
2224
googleDork =
2325

26+
27+
# These options can be used to specify how to connect to the target url.
2428
[Request]
2529

2630
# HTTP method to perform HTTP requests.
@@ -111,6 +115,10 @@ retries = 3
111115
# Example: (google|yahoo)
112116
scope =
113117

118+
119+
# These options can be used to specify which parameters to test for,
120+
# provide custom injection payloads and how to parse and compare HTTP
121+
# responses page content when using the blind SQL injection technique.
114122
[Injection]
115123

116124
# Testable parameter(s) comma separated. By default all GET/POST/Cookie
@@ -163,6 +171,10 @@ eString =
163171
# (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
164172
eRegexp =
165173

174+
175+
# These options can be used to test for specific SQL injection technique
176+
# or to use one of them to exploit the affected parameter(s) rather than
177+
# using the default blind SQL injection technique.
166178
[Techniques]
167179

168180
# Test for stacked queries (multiple statements) support.
@@ -203,6 +215,9 @@ unionUse = False
203215
extensiveFp = False
204216

205217

218+
# These options can be used to enumerate the back-end database
219+
# management system information, structure and data contained in the
220+
# tables. Moreover you can run your own SQL statements.
206221
[Enumeration]
207222

208223
# Retrieve back-end database management system banner.
@@ -249,7 +264,8 @@ getTables = False
249264
getColumns = False
250265

251266
# Dump back-end database management system database table entries.
252-
# Optional: db, tbl and col
267+
# Requires: tbl and/or col
268+
# Optional: db
253269
# Valid: True or False
254270
dumpTable = False
255271

@@ -306,6 +322,7 @@ query =
306322
sqlShell = False
307323

308324

325+
# These options can be used to create custom user-defined functions.
309326
[User-defined function]
310327

311328
# Inject custom user-defined functions
@@ -316,6 +333,8 @@ udfInject = False
316333
shLib =
317334

318335

336+
# These options can be used to access the back-end database management
337+
# system underlying file system.
319338
[File system]
320339

321340
# Read a specific file from the back-end DBMS underlying file system.
@@ -331,6 +350,8 @@ wFile =
331350
dFile =
332351

333352

353+
# These options can be used to access the back-end database management
354+
# system underlying operating system.
334355
[Takeover]
335356

336357
# Execute an operating system command.
@@ -369,6 +390,8 @@ msfPath =
369390
tmpPath =
370391

371392

393+
# These options can be used to access the back-end database management
394+
# system Windows registry.
372395
[Windows]
373396

374397
# Read a Windows registry key value

0 commit comments

Comments
 (0)