aboutsummaryrefslogtreecommitdiff
path: root/network/sqlmap/README
diff options
context:
space:
mode:
authorMarco Bonetti <sid77@slackware.it>2010-05-12 23:32:48 +0200
committerDavid Somero <xgizzmo@slackbuilds.org>2010-05-12 23:32:48 +0200
commitac23f7579cef7d587954ae36544a421fcac769ba (patch)
treed1c73ae84554721d04498acc231226d91d20b42b /network/sqlmap/README
parentb43054d76b9780b938e074632d345661877e39e3 (diff)
network/sqlmap: Added to 12.2 repository
Diffstat (limited to 'network/sqlmap/README')
-rw-r--r--network/sqlmap/README8
1 files changed, 8 insertions, 0 deletions
diff --git a/network/sqlmap/README b/network/sqlmap/README
new file mode 100644
index 0000000000000..fa2b395a1adc7
--- /dev/null
+++ b/network/sqlmap/README
@@ -0,0 +1,8 @@
+sqlmap is an open source command-line automatic SQL injection tool developed
+in Python. Its goal is to detect and take advantage of SQL injection
+vulnerabilities on web applications. Once it detects one or more SQL
+injections on the target host, the user can choose among a variety of options
+to perform an extensive back-end database management system fingerprint,
+retrieve DBMS session user and database, enumerate users, password hashes,
+privileges, databases, dump entire or user's specific DBMS tables/columns, run
+his own SQL statement, read specific files on the file system and more.