mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2026-01-22 06:09:02 +00:00
Rewrite from scratch the detection engine. Now it performs checks defined in payload.xml. User can specify its own.
All (hopefully) functionalities should still be working. Added two switches, --level and --risk to specify which injection tests and boundaries to use. The main advantage now is that sqlmap is able to identify initially which injection types are present so for instance if boolean-based blind is not supported, but error-based is, sqlmap will keep going and work!
This commit is contained in:
14
sqlmap.conf
14
sqlmap.conf
@@ -192,6 +192,20 @@ tamper =
|
||||
# content from HTTP responses when using blind SQL injection technique.
|
||||
[Detection]
|
||||
|
||||
# Level of tests to perform
|
||||
# The higher the value is, the higher the number of HTTP(s) requests are
|
||||
# as well as the better chances to detect a tricky SQL injection.
|
||||
# Valid: Integer between 1 and 5
|
||||
# Default: 1
|
||||
level = 1
|
||||
|
||||
# Risk of tests to perform
|
||||
# Note: boolean-based blind SQL injection tests with AND are considered
|
||||
# risk 1, with OR are considered risk 3.
|
||||
# Valid: Integer between 0 and 3
|
||||
# Default: 1
|
||||
risk = 1
|
||||
|
||||
# String to match within the page content when the query is valid, only
|
||||
# needed if the page content dynamically changes at each refresh.
|
||||
# Refer to the user's manual for further details.
|
||||
|
||||
Reference in New Issue
Block a user