Skip to content

Commit c42c498

Browse files
committed
Updated documentation according to r1460
1 parent 7d8cc1a commit c42c498

File tree

3 files changed

+25
-47
lines changed

3 files changed

+25
-47
lines changed

doc/README.html

Lines changed: 18 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -247,7 +247,7 @@ <H2><A NAME="ss1.4">1.4</A> <A HREF="#toc1.4">Demo</A>
247247
</H2>
248248

249249
<P>You can watch several demo videos, they are hosted on
250-
<A HREF="http://www.youtube.com/user/inquisb#p/u">YouTube</A> and linked
250+
<A HREF="http://www.youtube.com/user/inquisb#g/u">YouTube</A> and linked
251251
from
252252
<A HREF="http://sqlmap.sourceforge.net/demo.html">here</A>.</P>
253253

@@ -276,13 +276,12 @@ <H2><A NAME="ss2.1">2.1</A> <A HREF="#toc2.1">Generic features</A>
276276
targets from
277277
<A HREF="http://portswigger.net/suite/">Burp proxy</A>
278278
requests log file or
279-
<A HREF="http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project">WebScarab proxy</A>
280-
<CODE>conversations/</CODE> folder, get the whole HTTP request from a text
281-
file or get the list of targets by providing sqlmap with a Google dork
282-
which queries
283-
<A HREF="http://www.google.com">Google</A> search engine and
284-
parses its results page. You can also define a regular-expression based
285-
scope that is used to identify which of the parsed addresses to test.
279+
<A HREF="http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project">WebScarab proxy</A> <CODE>conversations/</CODE> folder, get the whole HTTP
280+
request from a text file or get the list of targets by providing sqlmap
281+
with a Google dork which queries
282+
<A HREF="http://www.google.com">Google</A> search engine and parses its results page. You can also
283+
define a regular-expression based scope that is used to identify which of
284+
the parsed addresses to test.
286285
</LI>
287286
<LI>Automatically tests all provided <B>GET</B> parameters,
288287
<B>POST</B> parameters, HTTP <B>Cookie</B> header values and HTTP
@@ -457,10 +456,8 @@ <H2><A NAME="ss2.3">2.3</A> <A HREF="#toc2.3">Takeover features</A>
457456
the
458457
<A HREF="http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0346.html">kitrap0d</A> technique (
459458
<A HREF="http://www.microsoft.com/technet/security/bulletin/ms10-015.mspx">MS10-015</A>) or via
460-
<A HREF="http://www.argeniss.com/research/TokenKidnapping.pdf">Windows Access Tokens kidnapping</A> by using either Meterpreter's
461-
<CODE>incognito</CODE> extension or <CODE>Churrasco</CODE> (
462-
<A HREF="http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx">MS09-012</A>) stand-alone executable
463-
as per user's choice.
459+
<A HREF="http://www.argeniss.com/research/TokenKidnapping.pdf">Windows Access Tokens kidnapping</A> by using Meterpreter's
460+
<CODE>incognito</CODE> extension.
464461
</LI>
465462
<LI>Support to access (read/add/delete) Windows registry hives.</LI>
466463
</UL>
@@ -538,10 +535,8 @@ <H2><A NAME="s3">3.</A> <A HREF="#toc3">Download and update</A></H2>
538535
time the sqlmap new version has been released.</LI>
539536
<LI>The Debian and Red Hat installation packages (deb and rpm) are
540537
compliant with the Linux distributions' packaging guidelines. This implies
541-
that they do not support the update features and do not include
542-
third-party softwares Churrasco (used to perform Windows token kidnapping,
543-
see below) and UPX (used to pack the Metasploit payload stager in some
544-
cases, see below).</LI>
538+
that they do not support the update features and do not include UPX (used
539+
to pack the Metasploit payload stager in some cases, see below).</LI>
545540
<LI>The Windows binary package (exe) can't update itself and does not
546541
support the takeover out-of-band features because they rely on
547542
Metasploit's <CODE>msfcli</CODE> which is not available for Windows.</LI>
@@ -694,7 +689,7 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
694689
--os-pwn Prompt for an out-of-band shell, meterpreter or VNC
695690
--os-smbrelay One click prompt for an OOB shell, meterpreter or VNC
696691
--os-bof Stored procedure buffer overflow exploitation
697-
--priv-esc User priv escalation by abusing Windows access tokens
692+
--priv-esc Database process' user privilege escalation
698693
--msf-path=MSFPATH Local path where Metasploit Framework 3 is installed
699694
--tmp-path=TMPPATH Remote absolute path of temporary files directory
700695

@@ -4968,11 +4963,8 @@ <H3>Prompt for an out-of-band shell, Meterpreter or VNC</H3>
49684963
the
49694964
<A HREF="http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0346.html">kitrap0d</A> technique (
49704965
<A HREF="http://www.microsoft.com/technet/security/bulletin/ms10-015.mspx">MS10-015</A>) or via
4971-
<A HREF="http://www.argeniss.com/research/TokenKidnapping.pdf">Windows Access Tokens kidnapping</A> by using either Meterpreter's
4972-
<A HREF="http://sourceforge.net/projects/incognito/">incognito</A> extension or
4973-
<A HREF="http://www.argeniss.com/research/Churrasco.zip">Churrasco</A>
4974-
(
4975-
<A HREF="http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx">MS09-012</A>) stand-alone executable as per user's choice.</P>
4966+
<A HREF="http://www.argeniss.com/research/TokenKidnapping.pdf">Windows Access Tokens kidnapping</A> by using Meterpreter's
4967+
<A HREF="http://sourceforge.net/projects/incognito/">incognito</A> extension.</P>
49764968

49774969
<P>Example on a <B>Microsoft SQL Server 2005 Service Pack 0</B> running as
49784970
<CODE>NETWORK SERVICE</CODE> on the target:</P>
@@ -5023,9 +5015,7 @@ <H3>Prompt for an out-of-band shell, Meterpreter or VNC</H3>
50235015
[hh:mm:53] [INFO] creation in progress ..... done
50245016
[hh:mm:58] [INFO] compression in progress . done
50255017
[hh:mm:59] [INFO] uploading payload stager to 'C:/WINDOWS/Temp/tmpmqyws.exe'
5026-
do you want sqlmap to upload Churrasco and call the Metasploit payload stager as its
5027-
argument so that it will be started as SYSTEM? [y/N]
5028-
[hh:mm:22] [INFO] running Metasploit Framework 3 command line interface locally, wait..
5018+
[hh:mm:05] [INFO] running Metasploit Framework 3 command line interface locally, wait..
50295019
[*] Please wait while we load the module tree...
50305020
[*] Started reverse handler on 172.16.213.1:44780
50315021
[*] Starting the payload handler...
@@ -5144,11 +5134,9 @@ <H3>One click prompt for an out-of-band shell, meterpreter or VNC</H3>
51445134
[hh:mm:16] [INFO] which is the back-end DBMS address? [172.16.213.131] 172.16.213.131
51455135
[hh:mm:16] [INFO] which remote port numer do you want to use? [4907] 4907
51465136
[hh:mm:16] [INFO] which payload do you want to use?
5147-
[1] Reflective Meterpreter (default)
5148-
[2] PatchUp Meterpreter (only from Metasploit development revision 6742)
5149-
[3] Shell
5150-
[4] Reflective VNC
5151-
[5] PatchUp VNC (only from Metasploit development revision 6742)
5137+
[1] Meterpreter (default)
5138+
[2] Shell
5139+
[3] VNC
51525140
> 1
51535141
[hh:mm:16] [INFO] which SMB port do you want to use?
51545142
[1] 139/TCP (default)

doc/README.pdf

-1.28 KB
Binary file not shown.

doc/README.sgml

Lines changed: 7 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -407,11 +407,8 @@ name="kitrap0d"> technique (<htmlurl
407407
url="http://www.microsoft.com/technet/security/bulletin/ms10-015.mspx"
408408
name="MS10-015">) or via <htmlurl
409409
url="http://www.argeniss.com/research/TokenKidnapping.pdf"
410-
name="Windows Access Tokens kidnapping"> by using either Meterpreter's
411-
<tt>incognito</tt> extension or <tt>Churrasco</tt> (<htmlurl
412-
url="http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx"
413-
name="MS09-012">) stand-alone executable
414-
as per user's choice.
410+
name="Windows Access Tokens kidnapping"> by using Meterpreter's
411+
<tt>incognito</tt> extension.
415412

416413
<item>Support to access (read/add/delete) Windows registry hives.
417414
</itemize>
@@ -484,10 +481,8 @@ contains the working copy from the Subversion repository updated at the
484481
time the sqlmap new version has been released.
485482
<item>The Debian and Red Hat installation packages (deb and rpm) are
486483
compliant with the Linux distributions' packaging guidelines. This implies
487-
that they do not support the update features and do not include
488-
third-party softwares Churrasco (used to perform Windows token kidnapping,
489-
see below) and UPX (used to pack the Metasploit payload stager in some
490-
cases, see below).
484+
that they do not support the update features and do not include UPX (used
485+
to pack the Metasploit payload stager in some cases, see below).
491486
<item>The Windows binary package (exe) can't update itself and does not
492487
support the takeover out-of-band features because they rely on
493488
Metasploit's <tt>msfcli</tt> which is not available for Windows.
@@ -4872,12 +4867,9 @@ name="kitrap0d"> technique (<htmlurl
48724867
url="http://www.microsoft.com/technet/security/bulletin/ms10-015.mspx"
48734868
name="MS10-015">) or via <htmlurl
48744869
url="http://www.argeniss.com/research/TokenKidnapping.pdf"
4875-
name="Windows Access Tokens kidnapping"> by using either Meterpreter's
4870+
name="Windows Access Tokens kidnapping"> by using Meterpreter's
48764871
<htmlurl url="http://sourceforge.net/projects/incognito/"
4877-
name="incognito"> extension or <htmlurl
4878-
url="http://www.argeniss.com/research/Churrasco.zip" name="Churrasco">
4879-
(<htmlurl url="http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx"
4880-
name="MS09-012">) stand-alone executable as per user's choice.
4872+
name="incognito"> extension.
48814873

48824874
<p>
48834875
Example on a <bf>Microsoft SQL Server 2005 Service Pack 0</bf> running as
@@ -4928,9 +4920,7 @@ which payload encoding do you want to use?
49284920
[hh:mm:53] [INFO] creation in progress ..... done
49294921
[hh:mm:58] [INFO] compression in progress . done
49304922
[hh:mm:59] [INFO] uploading payload stager to 'C:/WINDOWS/Temp/tmpmqyws.exe'
4931-
do you want sqlmap to upload Churrasco and call the Metasploit payload stager as its
4932-
argument so that it will be started as SYSTEM? [y/N]
4933-
[hh:mm:22] [INFO] running Metasploit Framework 3 command line interface locally, wait..
4923+
[hh:mm:05] [INFO] running Metasploit Framework 3 command line interface locally, wait..
49344924
[*] Please wait while we load the module tree...
49354925
[*] Started reverse handler on 172.16.213.1:44780
49364926
[*] Starting the payload handler...

0 commit comments

Comments
 (0)