@@ -105,9 +105,9 @@ <H2><A NAME="ss1.1">1.1</A> <A HREF="#toc1.1">Requirements</A>
105105Windows users can download and install the Python setup-ready installer
106106for x86, AMD64 and Itanium too.</ P >
107107< P > sqlmap relies on the
108- < A HREF ="http://metasploit.com/framework/ "> Metasploit Framework</ A > for some of its post-exploitation takeover
108+ < A HREF ="http://metasploit.com "> Metasploit Framework</ A > for some of its post-exploitation takeover
109109features. You need to grab a copy of it from the
110- < A HREF ="http://metasploit.com/framework/ download/ "> download</ A >
110+ < A HREF ="http://metasploit.com/download/ "> download</ A >
111111page - the required version is < B > 3.5</ B > or higher.
112112For the ICMP tunneling out-of-band takeover technique, sqlmap requires
113113< A HREF ="http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=tool&name=Impacket "> Impacket</ A > library too.</ P >
@@ -418,7 +418,7 @@ <H2><A NAME="ss2.1">2.1</A> <A HREF="#toc2.1">Generic features</A>
418418message to the user.
419419</ LI >
420420< LI > Integration with other IT security open source projects,
421- < A HREF ="http://metasploit.com/framework/ "> Metasploit</ A > and
421+ < A HREF ="http://metasploit.com "> Metasploit</ A > and
422422< A HREF ="http://w3af.sourceforge.net/ "> w3af</ A > .</ LI >
423423</ UL >
424424</ P >
@@ -727,7 +727,7 @@ <H2><A NAME="ss3.4">3.4</A> <A HREF="#toc3.4">2008</A>
727727< LI > < B > October 20</ B > , sqlmap first point release, < B > 0.6.1</ B > , goes
728728public. This includes minor bug fixes and the first contact between the
729729tool and
730- < A HREF ="http://metasploit.com/framework "> Metasploit</ A > :
730+ < A HREF ="http://metasploit.com "> Metasploit</ A > :
731731an auxiliary module to launch sqlmap from within Metasploit Framework.
732732The
733733< A HREF ="https://svn.sqlmap.org/sqlmap/trunk/sqlmap/ "> subversion development repository</ A > goes public again.
@@ -1445,16 +1445,16 @@ <H3>Output prediction</H3>
14451445< P > Switch: < CODE > -</ CODE > < CODE > -predict-output</ CODE > </ P >
14461446
14471447< P > This switch is used in inference algorithm for sequential statistical
1448- prediction of characters of value being retrieved. Based on items given in
1449- < CODE > txt/common-outputs.txt </ CODE > together with the knowledge of current
1450- enumeration used statistical table with the most promising values is being
1451- built . In case that the value can be found among the common output values,
1452- as the process progresses, subsequent character tables are being narrowed
1453- more and more. If used in combination with retrieval of common DBMS
1454- entities, as with system table names and privileges, speed up is
1455- significant. Of course, you can edit the common outputs file according to
1456- your needs if, for instance, you notice common patterns in database table
1457- names or similar.</ P >
1448+ prediction of characters of value being retrieved. Statistical table with
1449+ the most promising character values is being built based on items given in
1450+ < CODE > txt/common-outputs.txt </ CODE > combined with the knowledge of current
1451+ enumeration used . In case that the value can be found among the common
1452+ output values, as the process progresses, subsequent character tables are
1453+ being narrowed more and more. If used in combination with retrieval of
1454+ common DBMS entities, as with system table names and privileges, speed up
1455+ is significant. Of course, you can edit the common outputs file according
1456+ to your needs if, for instance, you notice common patterns in database
1457+ table names or similar.</ P >
14581458
14591459< P > Note that this switch is not compatible with < CODE > -</ CODE > < CODE > -threads</ CODE >
14601460switch.</ P >
@@ -1507,9 +1507,8 @@ <H3>Concurrent HTTP(S) requests</H3>
15071507when that character is retrieved - it takes up to 7 HTTP(S) requests with
15081508the bisection algorithm implemented in sqlmap.</ P >
15091509
1510- < P > Note that the multi-threading switch does not affect any other SQL
1511- injection technique. The maximum number of concurrent requests is set to
1512- < B > 10</ B > for performance and site reliability reasons.</ P >
1510+ < P > The maximum number of concurrent requests is set to < B > 10</ B > for
1511+ performance and site reliability reasons.</ P >
15131512
15141513< P > Note that this switch is not compatible with
15151514< CODE > -</ CODE > < CODE > -predict-output</ CODE > switch.</ P >
@@ -1682,7 +1681,7 @@ <H3>Tamper injection data</H3>
16821681from lib.core.enums import PRIORITY
16831682
16841683# Define which is the order of application of tamper scripts against the payload
1685- __priority__ = PRIORITY.HIGHEST
1684+ __priority__ = PRIORITY.NORMAL
16861685
16871686def tamper(payload):
16881687 '''
@@ -1691,8 +1690,9 @@ <H3>Tamper injection data</H3>
16911690
16921691 retVal = payload
16931692
1694- # your code to tamper the original payload (retVal)
1693+ # your code to tamper the original payload
16951694
1695+ # return the tampered payload
16961696 return retVal
16971697</ PRE >
16981698</ CODE > </ BLOCKQUOTE >
@@ -1701,12 +1701,12 @@ <H3>Tamper injection data</H3>
17011701< P > You can check valid and usable tamper scripts in the < CODE > tamper/</ CODE >
17021702directory.</ P >
17031703
1704- < P > Example against a MySQL target assuming < CODE > ></ CODE > character, spaces and
1705- < CODE > SELECT</ CODE > string are banned:</ P >
1704+ < P > Example against a MySQL target assuming that < CODE > ></ CODE > character,
1705+ spaces and capital < CODE > SELECT</ CODE > string are banned:</ P >
17061706< P >
17071707< BLOCKQUOTE > < CODE >
17081708< PRE >
1709- $ python sqlmap.py -u "http://debiandev /sqlmap/mysql/get_int.php?id=1" --tamper \
1709+ $ python sqlmap.py -u "http://192.168.136.131 /sqlmap/mysql/get_int.php?id=1" --tamper \
17101710tamper/between.py,tamper/randomcase.py,tamper/space2comment.py -v 3
17111711
17121712[hh:mm:03] [DEBUG] cleaning up configuration parameters
@@ -1816,7 +1816,7 @@ <H3>Page comparison</H3>
18161816This way the distinction will be based upon string presence or regular
18171817expression match.</ P >
18181818
1819- < P > In cases with lot of active (e.g. scripts, embeds, etc.) content in the
1819+ < P > In cases with lot of active content (e.g. scripts, embeds, etc.) in the
18201820HTTP responses' body, you can filter pages (< CODE > -</ CODE > < CODE > -text-only</ CODE >
18211821switch) just for their textual content. This way, in a good number of
18221822cases, you can automatically tune the detection engine.</ P >
@@ -2987,7 +2987,7 @@ <H3>Replicate dumped data into a sqlite3 database</H3>
29872987
29882988< P > You can then use sqlmap itself to read and query the locally created
29892989SQLite 3 file. For instance, < CODE > python sqlmap.py -d
2990- sqlite:///tmp/sqlmap/output/debiandev /dump/testdb.sqlite3 --table</ CODE > .</ P >
2990+ sqlite:///tmp/sqlmap/output/192.168.136.131 /dump/testdb.sqlite3 --table</ CODE > .</ P >
29912991
29922992
29932993< H3 > Simple wizard interface for beginner users</ H3 >
0 commit comments