aboutsummaryrefslogtreecommitdiff
path: root/network/sqlmap/README
diff options
context:
space:
mode:
authorBrenton Earl <brent@exitstatusone.com>2015-11-11 00:12:41 -0600
committerWilly Sudiarto Raharjo <willysr@slackbuilds.org>2015-11-14 07:07:34 +0700
commit2822f53632f3306e95c48e6974cf86716600b420 (patch)
tree5bf8f7848ac39c10dbd57b34c11b803f5ef816e6 /network/sqlmap/README
parentac3d5d65520c7a061396f1312321267addc769ea (diff)
network/sqlmap: Misc tweaks and new maintainer
Signed-off-by: Robby Workman <rworkman@slackbuilds.org>
Diffstat (limited to 'network/sqlmap/README')
-rw-r--r--network/sqlmap/README15
1 files changed, 7 insertions, 8 deletions
diff --git a/network/sqlmap/README b/network/sqlmap/README
index fa2b395a1adc..fc2fba4f2312 100644
--- a/network/sqlmap/README
+++ b/network/sqlmap/README
@@ -1,8 +1,7 @@
-sqlmap is an open source command-line automatic SQL injection tool developed
-in Python. Its goal is to detect and take advantage of SQL injection
-vulnerabilities on web applications. Once it detects one or more SQL
-injections on the target host, the user can choose among a variety of options
-to perform an extensive back-end database management system fingerprint,
-retrieve DBMS session user and database, enumerate users, password hashes,
-privileges, databases, dump entire or user's specific DBMS tables/columns, run
-his own SQL statement, read specific files on the file system and more.
+sqlmap is an open source penetration testing tool that automates the
+process of detecting and exploiting SQL injection flaws and taking over
+of database servers. It comes with a powerful detection engine, many
+niche features for the ultimate penetration tester and a broad range of
+switches lasting from database fingerprinting, over data fetching from
+the database, to accessing the underlying file system and executing
+commands on the operating system via out-of-band connections.