mirror of
https://github.com/nmap/nmap.git
synced 2025-12-25 00:49:01 +00:00
Fix a few little formatting errors in SQLInject.nse.
This commit is contained in:
@@ -5,16 +5,16 @@ injection attack.
|
||||
|
||||
The script spiders an HTTP server looking for URLs containing queries. It then
|
||||
proceeds to combine crafted SQL commands with susceptible URLs in order to
|
||||
obtain errors. The errors are analysed to see if the url is vulnerable to
|
||||
obtain errors. The errors are analysed to see if the URL is vulnerable to
|
||||
attack. This uses the most basic form of SQL injection but anything more
|
||||
complication is more suited to a stand alone tool. Both meta and HTTP redirects
|
||||
complication is more suited to a standalone tool. Both meta and HTTP redirects
|
||||
are supported.
|
||||
|
||||
It is not advisable to run this against unknown hosts.
|
||||
|
||||
We may not have access to the servers true hostname. This means we cannot
|
||||
We may not have access to the server's true hostname. This means we cannot
|
||||
access virtually hosted sites and cannot follow absolute links when the
|
||||
hostname is different from the resolved ip address
|
||||
hostname is different from the resolved IP address
|
||||
]]
|
||||
|
||||
require('url')
|
||||
|
||||
Reference in New Issue
Block a user