mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2026-01-22 06:09:02 +00:00
added "Detection" part in help listing
This commit is contained in:
14
sqlmap.conf
14
sqlmap.conf
@@ -154,8 +154,7 @@ threads = 1
|
||||
|
||||
|
||||
# These options can be used to specify which parameters to test for,
|
||||
# provide custom injection payloads and how to parse and compare HTTP
|
||||
# responses page content when using the blind SQL injection technique.
|
||||
# provide custom injection payloads and optional tampering scripts.
|
||||
[Injection]
|
||||
|
||||
# Testable parameter(s) comma separated. By default all GET/POST/Cookie
|
||||
@@ -183,6 +182,14 @@ prefix =
|
||||
# Injection payload postfix string
|
||||
postfix =
|
||||
|
||||
# Use given script(s) for tampering injection data
|
||||
tamper =
|
||||
|
||||
|
||||
# These options can be used to specify how to parse and compare page
|
||||
# content from HTTP responses when using blind SQL injection technique.
|
||||
[Detection]
|
||||
|
||||
# String to match within the page content when the query is valid, only
|
||||
# needed if the page content dynamically changes at each refresh,
|
||||
# consequently changing the MD5 hash of the page which is the method used
|
||||
@@ -221,9 +228,6 @@ textOnly = False
|
||||
# Valid: True or False
|
||||
longestCommon = False
|
||||
|
||||
# Use given script(s) for tampering injection data
|
||||
tamper =
|
||||
|
||||
|
||||
# These options can be used to test for specific SQL injection technique
|
||||
# or to use one of them to exploit the affected parameter(s) rather than
|
||||
|
||||
Reference in New Issue
Block a user