sqlmap-help

作者: 违规昵称不予展示 | 来源:发表于2019-07-12 11:24 被阅读0次
    """
    SQLMAP(1)                        User Commands                       SQLMAP(1)
    
    NAME
           sqlmap - automatic SQL injection tool
    
    SYNOPSIS
           python sqlmap [options]
    
    OPTIONS
           -h, --help
                  Show basic help message and exit
    
           -hh    Show advanced help message and exit 显示高级帮助消息并退出
    
           --version
                  Show program's version number and exit 显示程序的版本号并退出
    
           -v VERBOSE
                  Verbosity level: 0-6 (default 1)  详细级别:0-6(默认为1)
    
                  Target:
    
                  At  least  one of these options has to be provided to define the
                  target(s)  必须提供这些选项中的至少一个才能定义目标
    
           -d DIRECT
                  Connection string for direct database connection  直接数据库连接的连接字符串
    
           -u URL, --url=URL
                  Target URL (e.g. "http://www.site.com/vuln.php?id=1")
    
           -l LOGFILE
                  Parse target(s) from Burp or WebScarab proxy log file 从Burp或WebScarab代理日志文件解析目标
    
           -x SITEMAPURL
                  Parse target(s) from remote sitemap(.xml) file 从远程站点地图(.xml)文件解析目标
    
           -m BULKFILE
                  Scan multiple targets given in a textual file 扫描文本文件中给定的多个目标
    
           -r REQUESTFILE
                  Load HTTP request from a file  从文件加载HTTP请求
    
           -g GOOGLEDORK
                  Process Google dork results as target URLs  将Google dork结果作为目标URL处理
    
           -c CONFIGFILE
                  Load options from a configuration INI file  从配置INI文件加载选项
    
                  Request:
    
                  These options can be used to specify how to connect to the  tar‐
                  get URL  这些选项可用于指定如何连接到目标URL
    
           --method=METHOD
                  Force usage of given HTTP method (e.g. PUT)  强制使用给定HTTP方法(例如PUT)
    
           --data=DATA
                  Data string to be sent through POST  要通过POST发送的数据字符串
    
           --param-del=PARA..
                  Character used for splitting parameter values  用于拆分参数值的字符
    
           --cookie=COOKIE
                  HTTP Cookie header value --> HTTP Cookie报头值
    
           --cookie-del=COO..
                  Character used for splitting cookie values  用于拆分Cookie值的字符
    
           --load-cookies=L..
                  File containing cookies in Netscape/wget format
    
           --drop-set-cookie
                  Ignore Set-Cookie header from response  忽略响应中的Set-Cookie标头
    
           --user-agent=AGENT
                  HTTP User-Agent header value  --> HTTP User-Agent标头值
    
           --random-agent
                  Use randomly selected HTTP User-Agent header value  使用随机选择的HTTP User-Agent标头值
    
           --host=HOST
                  HTTP Host header value --> HTTP主机标头值
    
           --referer=REFERER
                  HTTP Referer header value --> HTTP Referer标头值
    
           -H HEADER, --hea..
                  Extra header (e.g. "X-Forwarded-For: 127.0.0.1")
                  额外的标题(例如。“X-Forwarded-For:127.0.0.1”)
    
           --headers=HEADERS
                  Extra headers (e.g. "Accept-Language: fr\nETag: 123")
                 额外的标题(例如。“Accept-Language:fR\nETag:123”)
    
           --auth-type=AUTH..
                  HTTP authentication type (Basic, Digest, NTLM or PKI)
                  HTTP身份验证类型(基本、摘要、NTLM或PKI)
    
           --auth-cred=AUTH..
                  HTTP authentication credentials (name:password)
                   HTTP身份验证凭据(名称:密码)
    
           --auth-file=AUTH..
                  HTTP authentication PEM cert/private key file
                   HTTP验证PEM证书/私钥文件
    
           --ignore-401
                  Ignore HTTP Error 401 (Unauthorized)
                  忽略HTTP错误401(未授权)
    
           --proxy=PROXY
                  Use a proxy to connect to the target URL 使用代理连接到目标URL
    
           --proxy-cred=PRO..
                  Proxy authentication credentials (name:password) 代理身份验证凭据(名称:密码)
    
           --proxy-file=PRO..
                  Load proxy list from a file  从文件加载代理列表
    
           --ignore-proxy
                  Ignore system default proxy settings  忽略系统默认代理设置
    
           --tor  Use Tor anonymity network  使用ToR匿名网络
    
           --tor-port=TORPORT
                  Set Tor proxy port other than default  设置Tor代理端口而不是默认端口
    
           --tor-type=TORTYPE
                  Set Tor proxy type (HTTP (default), SOCKS4 or SOCKS5)
                     设置Tor代理类型(HTTP(默认)、SOCKS4或SOCKS5)
    
           --check-tor
                  Check to see if Tor is used properly  检查Tor是否使用正确
     
           --delay=DELAY
                  Delay in seconds between each HTTP request
    
           --timeout=TIMEOUT
                  Seconds to wait before timeout connection (default 30)
    
           --retries=RETRIES
                  Retries when the connection timeouts (default 3)
    
           --randomize=RPARAM
                  Randomly change value for given parameter(s)
    
           --safe-url=SAFEURL
                  URL address to visit frequently during testing
    
           --safe-post=SAFE..
                  POST data to send to a safe URL
    
           --safe-req=SAFER..
                  Load safe HTTP request from a file
    
           --safe-freq=SAFE..
                  Test requests between two visits to a given safe URL
    
           --skip-urlencode
                  Skip URL encoding of payload data
    
           --csrf-token=CSR..
                  Parameter used to hold anti-CSRF token
    
           --csrf-url=CSRFURL
                  URL address to visit to extract anti-CSRF token
    
           --force-ssl
                  Force usage of SSL/HTTPS
    
           --hpp  Use HTTP parameter pollution method
    
           --eval=EVALCODE
                  Evaluate  provided Python code before the request (e.g.  "import
                  hashlib;id2=hashlib.md5(id).hexdigest()")
    
                  Optimization:
    
                  These options can be used to optimize the performance of sqlmap
                   这些选项可用于优化sqlmap的性能
    
           -o     Turn on all optimization switches
    
           --predict-output
                  Predict common queries output
    
           --keep-alive
                  Use persistent HTTP(s) connections
    
           --null-connection
                  Retrieve page length without actual HTTP response body
    
           --threads=THREADS
                  Max number of concurrent HTTP(s) requests (default 1)
    
                  Injection:
    
                  These options can be used to specify which  parameters  to  test
                  for,  provide  custom  injection payloads and optional tampering
                  scripts
                  这些选项可用于指定要测试的参数,提供自定义注入有效负载和可选的篡改脚本
    
           -p TESTPARAMETER
                  Testable parameter(s)
    
           --skip=SKIP
                  Skip testing for given parameter(s)
    
           --skip-static
                  Skip testing parameters that not appear dynamic
    
           --dbms=DBMS
                  Force back-end DBMS to this value
    
           --dbms-cred=DBMS..
                  DBMS authentication credentials (user:password)
    
           --os=OS
                  Force back-end DBMS operating system to this value
    
           --invalid-bignum
                  Use big numbers for invalidating values
    
           --invalid-logical
                  Use logical operations for invalidating values
    
           --invalid-string
                  Use random strings for invalidating values
    
           --no-cast
                  Turn off payload casting mechanism
    
           --no-escape
                  Turn off string escaping mechanism
    
           --prefix=PREFIX
                  Injection payload prefix string
    
           --suffix=SUFFIX
                  Injection payload suffix string
    
           --tamper=TAMPER
                  Use given script(s) for tampering injection data
                   使用给定的脚本来篡改注入数据
    
                  Detection:
    
                  These options can be used to customize the detection phase
                   这些选项可用于自定义检测阶段
    
           --level=LEVEL
                  Level of tests to perform (1-5, default 1)
    
           --risk=RISK
                  Risk of tests to perform (1-3, default 1)
    
           --string=STRING
                  String to match when query is evaluated to True
    
           --not-string=NOT..
                  String to match when query is evaluated to False
    
           --regexp=REGEXP
                  Regexp to match when query is evaluated to True
    
           --code=CODE
                  HTTP code to match when query is evaluated to True
    
           --text-only
                  Compare pages based only on the textual content
    
           --titles
                  Compare pages based only on their titles
    
                  Techniques:
    
                  These options can be used to tweak testing of specific  SQL  in‐
                  jection techniques
                     这些选项可用于调整特定SQL注入技术的测试
    
           --technique=TECH
                  SQL injection techniques to use (default "BEUSTQ")
    
           --time-sec=TIMESEC
                  Seconds to delay the DBMS response (default 5)
    
           --union-cols=UCOLS
                  Range of columns to test for UNION query SQL injection
    
           --union-char=UCHAR
                  Character to use for bruteforcing number of columns
    
           --union-from=UFROM
                  Table to use in FROM part of UNION query SQL injection
    
           --dns-domain=DNS..
                  Domain name used for DNS exfiltration attack
    
           --second-order=S..
                  Resulting page URL searched for second-order response
    
                  Fingerprint:
    
           -f, --fingerprint
                  Perform an extensive DBMS version fingerprint
    
                  Enumeration:
    
                  These  options  can  be  used to enumerate the back-end database
                  management system information, structure and data  contained  in
                  the tables. Moreover you can run your own SQL statements
                  这些选项可用于枚举包含在表中的后端数据库管理系统信息、结构和数据。此外,您可以运行自己的SQL语句
    
           -a, --all
                  Retrieve everything
    
           -b, --banner
                  Retrieve DBMS banner
    
           --current-user
                  Retrieve DBMS current user
    
           --current-db
                  Retrieve DBMS current database
    
           --hostname
                  Retrieve DBMS server hostname
    
           --is-dba
                  Detect if the DBMS current user is DBA
    
           --users
                  Enumerate DBMS users
    
           --passwords
                  Enumerate DBMS users password hashes
    
           --privileges
                  Enumerate DBMS users privileges
    
           --roles
                  Enumerate DBMS users roles
    
           --dbs  Enumerate DBMS databases
    
           --tables
                  Enumerate DBMS database tables
    
           --columns
                  Enumerate DBMS database table columns
    
           --schema
                  Enumerate DBMS schema
    
           --count
                  Retrieve number of entries for table(s)
    
           --dump Dump DBMS database table entries
    
           --dump-all
                  Dump all DBMS databases tables entries
    
           --search
                  Search column(s), table(s) and/or database name(s)
    
           --comments
                  Retrieve DBMS comments
    
           -D DB  DBMS database to enumerate
    
           -T TBL DBMS database table(s) to enumerate
    
           -C COL DBMS database table column(s) to enumerate
    
           -X EXCLUDECOL
                  DBMS database table column(s) to not enumerate
    
           -U USER
                  DBMS user to enumerate
    
           --exclude-sysdbs
                  Exclude DBMS system databases when enumerating tables
    
           --where=DUMPWHERE
                  Use WHERE condition while table dumping
    
           --start=LIMITSTART
                  First query output entry to retrieve
    
           --stop=LIMITSTOP
                  Last query output entry to retrieve
    
           --first=FIRSTCHAR
                  First query output word character to retrieve
    
           --last=LASTCHAR
                  Last query output word character to retrieve
    
           --sql-query=QUERY
                  SQL statement to be executed
    
           --sql-shell
                  Prompt for an interactive SQL shell
    
           --sql-file=SQLFILE
                  Execute SQL statements from given file(s)
    
                  Brute force:
    
                  These options can be used to run brute force checks 这些选项可用于运行暴力检查
    
           --common-tables
                  Check existence of common tables
    
           --common-columns
                  Check existence of common columns
    
                  User-defined function injection:
    
                  These  options  can  be used to create custom user-defined func‐
                  tions    这些选项可用于创建自定义用户定义函数
    
           --udf-inject
                  Inject custom user-defined functions
    
           --shared-lib=SHLIB
                  Local path of the shared library
    
                  File system access:
    
                  These options can be used to access the back-end  database  man‐
                  agement system underlying file system   这些选项可用于访问后端数据库管理系统底层文件系统
    
           --file-read=RFILE
                  Read a file from the back-end DBMS file system
    
           --file-write=WFILE
                  Write a local file on the back-end DBMS file system
    
           --file-dest=DFILE
                  Back-end DBMS absolute filepath to write to
    
                  Operating system access:
    
                  These  options  can be used to access the back-end database man‐
                  agement system underlying operating system   这些选项可用于访问后端数据库管理系统底层操作系统
    
           --os-cmd=OSCMD
                  Execute an operating system command
    
           --os-shell
                  Prompt for an interactive operating system shell
    
           --os-pwn
                  Prompt for an OOB shell, Meterpreter or VNC
    
           --os-smbrelay
                  One click prompt for an OOB shell, Meterpreter or VNC
    
           --os-bof
                  Stored procedure buffer overflow exploitation
    
           --priv-esc
                  Database process user privilege escalation
    
           --msf-path=MSFPATH
                  Local path where Metasploit Framework is installed
    
           --tmp-path=TMPPATH
                  Remote absolute path of temporary files directory
    
                  Windows registry access:
    
                  These options can be used to access the back-end  database  man‐
                  agement system Windows registry      这些选项可用于访问后端数据库管理系统Windows注册表
    
           --reg-read
                  Read a Windows registry key value
    
           --reg-add
                  Write a Windows registry key value data
    
           --reg-del
                  Delete a Windows registry key value
    
           --reg-key=REGKEY
                  Windows registry key
    
           --reg-value=REGVAL
                  Windows registry key value
    
           --reg-data=REGDATA
                  Windows registry key value data
    
           --reg-type=REGTYPE
                  Windows registry key value type
    
                  General:
    
                  These options can be used to set some general working parameters
                  这些选项可用于设置一些常规工作参数
    
           -s SESSIONFILE
                  Load session from a stored (.sqlite) file
    
           -t TRAFFICFILE
                  Log all HTTP traffic into a textual file
    
           --batch
                  Never ask for user input, use the default behaviour
    
           --charset=CHARSET
                  Force character encoding used for data retrieval
    
           --crawl=CRAWLDEPTH
                  Crawl the website starting from the target URL
    
           --crawl-exclude=..
                  Regexp to exclude pages from crawling (e.g. "logout")
    
           --csv-del=CSVDEL
                  Delimiting character used in CSV output (default ",")
    
           --dump-format=DU..
                  Format of dumped data (CSV (default), HTML or SQLITE)
    
           --eta  Display for each output the estimated time of arrival
    
           --flush-session
                  Flush session files for current target
    
           --forms
                  Parse and test forms on target URL
    
           --fresh-queries
                  Ignore query results stored in session file
    
           --hex  Use DBMS hex function(s) for data retrieval
    
           --output-dir=OUT..
                  Custom output directory path
    
           --parse-errors
                  Parse and display DBMS error messages from responses
    
           --pivot-column=P..
                  Pivot column name
    
           --save=SAVECONFIG
                  Save options to a configuration INI file
    
           --scope=SCOPE
                  Regexp to filter targets from provided proxy log
    
           --test-filter=TE..
                  Select tests by payloads and/or titles (e.g. ROW)
    
           --test-skip=TEST..
                  Skip tests by payloads and/or titles (e.g. BENCHMARK)
    
           --update
                  Update sqlmap
    
                  Miscellaneous:
    
           -z MNEMONICS
                  Use short mnemonics (e.g. "flu,bat,ban,tec=EU")
    
           --alert=ALERT
                  Run host OS command(s) when SQL injection is found
    
           --answers=ANSWERS
                  Set question answers (e.g. "quit=N,follow=N")
    
           --beep Beep on question and/or when SQL injection is found
    
           --cleanup
                  Clean up the DBMS from sqlmap specific UDF and tables
    
           --dependencies
                  Check for missing (non-core) sqlmap dependencies
    
           --disable-coloring
                  Disable console output coloring
    
           --gpage=GOOGLEPAGE
                  Use Google dork results from specified page number
    
           --identify-waf
                  Make a thorough testing for a WAF/IPS/IDS protection
    
           --skip-waf
                  Skip heuristic detection of WAF/IPS/IDS protection
    
           --mobile
                  Imitate smartphone through HTTP User-Agent header
    
           --offline
                  Work in offline mode (only use session data)
    
           --page-rank
                  Display page rank (PR) for Google dork results
    
           --purge-output
                  Safely remove all content from output directory
    
           --smart
                  Conduct thorough tests only if positive heuristic(s)
    
           --sqlmap-shell
                  Prompt for an interactive sqlmap shell
    
           --wizard
                  Simple wizard interface for beginner users
    
    sqlmap.py v0.9                   December 2015                       SQLMAP(1)
    
    

    相关文章

      网友评论

        本文标题:sqlmap-help

        本文链接:https://www.haomeiwen.com/subject/ohcekctx.html