From 43783008c116738851e18ac128d9315eeceb9e6e Mon Sep 17 00:00:00 2001 From: Laurent Destailleur Date: Thu, 24 Sep 2020 15:45:52 +0200 Subject: [PATCH] Doc --- test/sqlmap/README | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/test/sqlmap/README b/test/sqlmap/README index 7405df478b6..da3a1ae6daf 100644 --- a/test/sqlmap/README +++ b/test/sqlmap/README @@ -44,7 +44,7 @@ Add, into file ~/git/sqlmap/data/xml/payloads/boolean_blind.xml, the custom rule Introduce a vulnerability by changing the GETPOST on parameter search_status into GETPOST('search_status', 'none') and removing $db->sanitize when parameter is used; ./sqlmap.py -A "securitytest" --threads=4 -u "http://localhostdev/comm/propal/list.php?search_status=*" --dbms=mysql --os=linux --technique=B --batch --skip-waf \ - --cookie="DOLSESSID_xxxxxx=yyyyyyyy;" --prefix='1' -v 5 > sqlmap.txt + --cookie="DOLSESSID_xxxxxx=yyyyyyyy;" --prefix='1' -v 4 > sqlmap.txt Check vulnerability is found into sqlmap.txt. Scanner is working.