@@ -247,7 +247,7 @@ <H2><A NAME="ss1.4">1.4</A> <A HREF="#toc1.4">Demo</A>
247
247
</ H2 >
248
248
249
249
< P > You can watch several demo videos, they are hosted on
250
- < A HREF ="http://www.youtube.com/user/inquisb#p /u "> YouTube</ A > and linked
250
+ < A HREF ="http://www.youtube.com/user/inquisb#g /u "> YouTube</ A > and linked
251
251
from
252
252
< A HREF ="http://sqlmap.sourceforge.net/demo.html "> here</ A > .</ P >
253
253
@@ -276,13 +276,12 @@ <H2><A NAME="ss2.1">2.1</A> <A HREF="#toc2.1">Generic features</A>
276
276
targets from
277
277
< A HREF ="http://portswigger.net/suite/ "> Burp proxy</ A >
278
278
requests log file or
279
- < A HREF ="http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project "> WebScarab proxy</ A >
280
- < CODE > conversations/</ CODE > folder, get the whole HTTP request from a text
281
- file or get the list of targets by providing sqlmap with a Google dork
282
- which queries
283
- < A HREF ="http://www.google.com "> Google</ A > search engine and
284
- parses its results page. You can also define a regular-expression based
285
- scope that is used to identify which of the parsed addresses to test.
279
+ < A HREF ="http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project "> WebScarab proxy</ A > < CODE > conversations/</ CODE > folder, get the whole HTTP
280
+ request from a text file or get the list of targets by providing sqlmap
281
+ with a Google dork which queries
282
+ < A HREF ="http://www.google.com "> Google</ A > search engine and parses its results page. You can also
283
+ define a regular-expression based scope that is used to identify which of
284
+ the parsed addresses to test.
286
285
</ LI >
287
286
< LI > Automatically tests all provided < B > GET</ B > parameters,
288
287
< B > POST</ B > parameters, HTTP < B > Cookie</ B > header values and HTTP
@@ -457,10 +456,8 @@ <H2><A NAME="ss2.3">2.3</A> <A HREF="#toc2.3">Takeover features</A>
457
456
the
458
457
< A HREF ="http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0346.html "> kitrap0d</ A > technique (
459
458
< A HREF ="http://www.microsoft.com/technet/security/bulletin/ms10-015.mspx "> MS10-015</ A > ) or via
460
- < A HREF ="http://www.argeniss.com/research/TokenKidnapping.pdf "> Windows Access Tokens kidnapping</ A > by using either Meterpreter's
461
- < CODE > incognito</ CODE > extension or < CODE > Churrasco</ CODE > (
462
- < A HREF ="http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx "> MS09-012</ A > ) stand-alone executable
463
- as per user's choice.
459
+ < A HREF ="http://www.argeniss.com/research/TokenKidnapping.pdf "> Windows Access Tokens kidnapping</ A > by using Meterpreter's
460
+ < CODE > incognito</ CODE > extension.
464
461
</ LI >
465
462
< LI > Support to access (read/add/delete) Windows registry hives.</ LI >
466
463
</ UL >
@@ -538,10 +535,8 @@ <H2><A NAME="s3">3.</A> <A HREF="#toc3">Download and update</A></H2>
538
535
time the sqlmap new version has been released.</ LI >
539
536
< LI > The Debian and Red Hat installation packages (deb and rpm) are
540
537
compliant with the Linux distributions' packaging guidelines. This implies
541
- that they do not support the update features and do not include
542
- third-party softwares Churrasco (used to perform Windows token kidnapping,
543
- see below) and UPX (used to pack the Metasploit payload stager in some
544
- cases, see below).</ LI >
538
+ that they do not support the update features and do not include UPX (used
539
+ to pack the Metasploit payload stager in some cases, see below).</ LI >
545
540
< LI > The Windows binary package (exe) can't update itself and does not
546
541
support the takeover out-of-band features because they rely on
547
542
Metasploit's < CODE > msfcli</ CODE > which is not available for Windows.</ LI >
@@ -694,7 +689,7 @@ <H2><A NAME="s5">5.</A> <A HREF="#toc5">Usage</A></H2>
694
689
--os-pwn Prompt for an out-of-band shell, meterpreter or VNC
695
690
--os-smbrelay One click prompt for an OOB shell, meterpreter or VNC
696
691
--os-bof Stored procedure buffer overflow exploitation
697
- --priv-esc User priv escalation by abusing Windows access tokens
692
+ --priv-esc Database process' user privilege escalation
698
693
--msf-path=MSFPATH Local path where Metasploit Framework 3 is installed
699
694
--tmp-path=TMPPATH Remote absolute path of temporary files directory
700
695
@@ -4968,11 +4963,8 @@ <H3>Prompt for an out-of-band shell, Meterpreter or VNC</H3>
4968
4963
the
4969
4964
< A HREF ="http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0346.html "> kitrap0d</ A > technique (
4970
4965
< A HREF ="http://www.microsoft.com/technet/security/bulletin/ms10-015.mspx "> MS10-015</ A > ) or via
4971
- < A HREF ="http://www.argeniss.com/research/TokenKidnapping.pdf "> Windows Access Tokens kidnapping</ A > by using either Meterpreter's
4972
- < A HREF ="http://sourceforge.net/projects/incognito/ "> incognito</ A > extension or
4973
- < A HREF ="http://www.argeniss.com/research/Churrasco.zip "> Churrasco</ A >
4974
- (
4975
- < A HREF ="http://www.microsoft.com/technet/security/bulletin/ms09-012.mspx "> MS09-012</ A > ) stand-alone executable as per user's choice.</ P >
4966
+ < A HREF ="http://www.argeniss.com/research/TokenKidnapping.pdf "> Windows Access Tokens kidnapping</ A > by using Meterpreter's
4967
+ < A HREF ="http://sourceforge.net/projects/incognito/ "> incognito</ A > extension.</ P >
4976
4968
4977
4969
< P > Example on a < B > Microsoft SQL Server 2005 Service Pack 0</ B > running as
4978
4970
< CODE > NETWORK SERVICE</ CODE > on the target:</ P >
@@ -5023,9 +5015,7 @@ <H3>Prompt for an out-of-band shell, Meterpreter or VNC</H3>
5023
5015
[hh:mm:53] [INFO] creation in progress ..... done
5024
5016
[hh:mm:58] [INFO] compression in progress . done
5025
5017
[hh:mm:59] [INFO] uploading payload stager to 'C:/WINDOWS/Temp/tmpmqyws.exe'
5026
- do you want sqlmap to upload Churrasco and call the Metasploit payload stager as its
5027
- argument so that it will be started as SYSTEM? [y/N]
5028
- [hh:mm:22] [INFO] running Metasploit Framework 3 command line interface locally, wait..
5018
+ [hh:mm:05] [INFO] running Metasploit Framework 3 command line interface locally, wait..
5029
5019
[*] Please wait while we load the module tree...
5030
5020
[*] Started reverse handler on 172.16.213.1:44780
5031
5021
[*] Starting the payload handler...
@@ -5144,11 +5134,9 @@ <H3>One click prompt for an out-of-band shell, meterpreter or VNC</H3>
5144
5134
[hh:mm:16] [INFO] which is the back-end DBMS address? [172.16.213.131] 172.16.213.131
5145
5135
[hh:mm:16] [INFO] which remote port numer do you want to use? [4907] 4907
5146
5136
[hh:mm:16] [INFO] which payload do you want to use?
5147
- [1] Reflective Meterpreter (default)
5148
- [2] PatchUp Meterpreter (only from Metasploit development revision 6742)
5149
- [3] Shell
5150
- [4] Reflective VNC
5151
- [5] PatchUp VNC (only from Metasploit development revision 6742)
5137
+ [1] Meterpreter (default)
5138
+ [2] Shell
5139
+ [3] VNC
5152
5140
> 1
5153
5141
[hh:mm:16] [INFO] which SMB port do you want to use?
5154
5142
[1] 139/TCP (default)
0 commit comments