mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-12-30 11:29:02 +00:00
initial work for issue #33
This commit is contained in:
@@ -118,6 +118,9 @@ def action():
|
||||
if conf.sqlShell:
|
||||
conf.dbmsHandler.sqlShell()
|
||||
|
||||
if conf.sqlFile:
|
||||
conf.dbmsHandler.sqlFile()
|
||||
|
||||
# User-defined function options
|
||||
if conf.udfInject:
|
||||
conf.dbmsHandler.udfInjectCustom()
|
||||
|
||||
@@ -119,7 +119,8 @@ optDict = {
|
||||
"firstChar": "integer",
|
||||
"lastChar": "integer",
|
||||
"query": "string",
|
||||
"sqlShell": "boolean"
|
||||
"sqlShell": "boolean",
|
||||
"sqlFile": "string"
|
||||
},
|
||||
|
||||
"Brute": {
|
||||
|
||||
@@ -383,6 +383,9 @@ def cmdLineParser():
|
||||
action="store_true",
|
||||
help="Prompt for an interactive SQL shell")
|
||||
|
||||
enumeration.add_option("--sql-file", dest="sqlFile",
|
||||
help="Execute SQL statements from given file(s)")
|
||||
|
||||
# User-defined function options
|
||||
brute = OptionGroup(parser, "Brute force", "These "
|
||||
"options can be used to run brute force "
|
||||
|
||||
Reference in New Issue
Block a user