diff options
author | Brenton Earl <brent@exitstatusone.com> | 2015-11-11 00:12:41 -0600 |
---|---|---|
committer | Willy Sudiarto Raharjo <willysr@slackbuilds.org> | 2015-11-14 07:07:34 +0700 |
commit | 2822f53632f3306e95c48e6974cf86716600b420 (patch) | |
tree | 5bf8f7848ac39c10dbd57b34c11b803f5ef816e6 /network/sqlmap/README | |
parent | ac3d5d65520c7a061396f1312321267addc769ea (diff) |
network/sqlmap: Misc tweaks and new maintainer
Signed-off-by: Robby Workman <rworkman@slackbuilds.org>
Diffstat (limited to 'network/sqlmap/README')
-rw-r--r-- | network/sqlmap/README | 15 |
1 files changed, 7 insertions, 8 deletions
diff --git a/network/sqlmap/README b/network/sqlmap/README index fa2b395a1adc..fc2fba4f2312 100644 --- a/network/sqlmap/README +++ b/network/sqlmap/README @@ -1,8 +1,7 @@ -sqlmap is an open source command-line automatic SQL injection tool developed -in Python. Its goal is to detect and take advantage of SQL injection -vulnerabilities on web applications. Once it detects one or more SQL -injections on the target host, the user can choose among a variety of options -to perform an extensive back-end database management system fingerprint, -retrieve DBMS session user and database, enumerate users, password hashes, -privileges, databases, dump entire or user's specific DBMS tables/columns, run -his own SQL statement, read specific files on the file system and more. +sqlmap is an open source penetration testing tool that automates the +process of detecting and exploiting SQL injection flaws and taking over +of database servers. It comes with a powerful detection engine, many +niche features for the ultimate penetration tester and a broad range of +switches lasting from database fingerprinting, over data fetching from +the database, to accessing the underlying file system and executing +commands on the operating system via out-of-band connections. |