Andres,
On 28 Apr 2011, at 13:53, "Andres Tarascó Acuña" wrote:
Thanks David!
so, to test sveral URI segments, i probable need to use something
like: ./sqlmap.py -u http://host/path/chunk1*/chunk2* --data="postparameter=foo"
is that right?
Yes.
what should i type into the "-p" parameter to c
Thanks David!
so, to test sveral URI segments, i probable need to use something
like: ./sqlmap.py -u http://host/path/chunk1*/chunk2* --data="postparameter=foo"
is that right?
what should i type into the "-p" parameter to check sql injections only
against chunk2 (instead of attacking "postparamete
Indeed, thanks David for replying.
I will update the user's manual with this feature at some point like someone
else pointed out.
Cheers,
Bernardo Damele A. G.
This message was sent from a smartphone
On 28 Apr 2011, at 13:33, David Guimaraes wrote:
Use * character at param value:
http://vulns
Use * character at param value:
http://vulnsite.com/vulnscript/1*/2
2011/4/28 Andres Tarascó Acuña
> Hello,
>
> I'm new to the list so probably I'm going to ask for something that was
> previously discussed. Anyway, I'm going to try :)
>
> I wish to know if there are plans to support "URI sql i