@@ -5295,12 +5295,13 @@ back-end DBMS: PostgreSQL
5295
5295
[hh:mm:24] [INFO] retrieved: 0
5296
5296
[hh:mm:25] [INFO] creating UDF 'sys_eval' from the binary UDF file
5297
5297
[hh:mm:25] [INFO] creating UDF 'sys_exec' from the binary UDF file
5298
- which registry key do you want to read? [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
5298
+ which registry key do you want to read? [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\
5299
+ CurrentVersion]
5299
5300
which registry key value do you want to read? [ProductName]
5300
- [hh:mm:34] [INFO] reading Windows registry path 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductName'
5301
+ [hh:mm:34] [INFO] reading Windows registry path 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
5302
+ Windows NT\CurrentVersion\ProductName'
5301
5303
[hh:mm:35] [INFO] retrieved: ProductName REG_SZ Microsoft Windows XP
5302
5304
Registry key value data: 'ProductName REG_SZ Microsoft Windows XP'
5303
- [...]
5304
5305
</verb></tscreen>
5305
5306
5306
5307
<sect2>Write a Windows registry key value
@@ -5338,10 +5339,9 @@ which registry key do you want to write? HKEY_LOCAL_MACHINE\SOFTWARE\sqlmap
5338
5339
which registry key value do you want to write? Test
5339
5340
which registry key value data do you want to write? 1
5340
5341
which registry key value data-type is it? [REG_SZ] REG_DWORD
5341
- [hh:mm:41] [INFO] adding Windows registry path 'HKEY_LOCAL_MACHINE\SOFTWARE\sqlmap\Test' with data '1'. This will
5342
- work only if the user running the database process has privileges to modify the Windows registry.
5343
-
5344
- [*] shutting down at: hh:mm:42
5342
+ [hh:mm:41] [INFO] adding Windows registry path 'HKEY_LOCAL_MACHINE\SOFTWARE\sqlmap\Test'
5343
+ with data '1'. This will work only if the user running the database process has privileges
5344
+ to modify the Windows registry.
5345
5345
</verb></tscreen>
5346
5346
5347
5347
<sect2>Delete a Windows registry key
@@ -5377,17 +5377,18 @@ back-end DBMS: PostgreSQL
5377
5377
[hh:mm:06] [INFO] creating UDF 'sys_exec' from the binary UDF file
5378
5378
which registry key do you want to delete? HKEY_LOCAL_MACHINE\SOFTWARE\sqlmap
5379
5379
which registry key value do you want to delete? Test
5380
- are you sure that you want to delete the Windows registry path 'HKEY_LOCAL_MACHINE\SOFTWARE\sqlmap\Test? [y/N] y
5381
- [hh:mm:26] [INFO] deleting Windows registry path 'HKEY_LOCAL_MACHINE\SOFTWARE\ sqlmap\Test'. This will work only
5382
- if the user running the database process has privileges to modify the Windows registry.
5383
-
5384
- [*] shutting down at: hh:mm:27
5380
+ are you sure that you want to delete the Windows registry path 'HKEY_LOCAL_MACHINE\SOFTWARE\
5381
+ sqlmap\Test? [y/N] y
5382
+ [hh:mm:26] [INFO] deleting Windows registry path 'HKEY_LOCAL_MACHINE\SOFTWARE\sqlmap\Test'.
5383
+ This will work only if the user running the database process has privileges to modify the
5384
+ Windows registry.
5385
5385
</verb></tscreen>
5386
5386
5387
+
5387
5388
<sect2>Auxiliary registry switches
5388
5389
5389
5390
<p>
5390
- Option : <tt>-</tt><tt>-reg-key</tt>, <tt>-</tt><tt>-reg-value</tt>,
5391
+ Options : <tt>-</tt><tt>-reg-key</tt>, <tt>-</tt><tt>-reg-value</tt>,
5391
5392
<tt>-</tt><tt>-reg-data</tt> and <tt>-</tt><tt>-reg-type</tt>
5392
5393
5393
5394
<p>
@@ -5409,7 +5410,7 @@ So, another way of running example from option
5409
5410
<tt>-</tt><tt>-reg-add</tt> could be:
5410
5411
5411
5412
<tscreen><verb>
5412
- $ python sqlmap.py -u http://172.16.213.128/sqlmap/pgsql/get_int.php?id=1 --reg-add\
5413
+ $ python sqlmap.py -u http://172.16.213.128/sqlmap/pgsql/get_int.php?id=1 --reg-add \
5413
5414
--reg-key=HKEY_LOCAL_MACHINE\SOFTWARE\sqlmap --reg-value=Test --reg-type=REG_SZ --reg-data=1
5414
5415
</verb></tscreen>
5415
5416
0 commit comments