1+ # At least one of these options has to be specified to set the source to
2+ # get target urls from.
13[Target]
24
35# Target URL.
@@ -21,6 +23,8 @@ requestFile =
2123# Example: +ext:php +inurl:"&id=" +intext:"powered by "
2224googleDork =
2325
26+
27+ # These options can be used to specify how to connect to the target url.
2428[Request]
2529
2630# HTTP method to perform HTTP requests.
@@ -111,6 +115,10 @@ retries = 3
111115# Example: (google|yahoo)
112116scope =
113117
118+
119+ # These options can be used to specify which parameters to test for,
120+ # provide custom injection payloads and how to parse and compare HTTP
121+ # responses page content when using the blind SQL injection technique.
114122[Injection]
115123
116124# Testable parameter(s) comma separated. By default all GET/POST/Cookie
@@ -163,6 +171,10 @@ eString =
163171# (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
164172eRegexp =
165173
174+
175+ # These options can be used to test for specific SQL injection technique
176+ # or to use one of them to exploit the affected parameter(s) rather than
177+ # using the default blind SQL injection technique.
166178[Techniques]
167179
168180# Test for stacked queries (multiple statements) support.
@@ -203,6 +215,9 @@ unionUse = False
203215extensiveFp = False
204216
205217
218+ # These options can be used to enumerate the back-end database
219+ # management system information, structure and data contained in the
220+ # tables. Moreover you can run your own SQL statements.
206221[Enumeration]
207222
208223# Retrieve back-end database management system banner.
@@ -249,7 +264,8 @@ getTables = False
249264getColumns = False
250265
251266# Dump back-end database management system database table entries.
252- # Optional: db, tbl and col
267+ # Requires: tbl and/or col
268+ # Optional: db
253269# Valid: True or False
254270dumpTable = False
255271
@@ -306,6 +322,7 @@ query =
306322sqlShell = False
307323
308324
325+ # These options can be used to create custom user-defined functions.
309326[User-defined function]
310327
311328# Inject custom user-defined functions
@@ -316,6 +333,8 @@ udfInject = False
316333shLib =
317334
318335
336+ # These options can be used to access the back-end database management
337+ # system underlying file system.
319338[File system]
320339
321340# Read a specific file from the back-end DBMS underlying file system.
@@ -331,6 +350,8 @@ wFile =
331350dFile =
332351
333352
353+ # These options can be used to access the back-end database management
354+ # system underlying operating system.
334355[Takeover]
335356
336357# Execute an operating system command.
@@ -369,6 +390,8 @@ msfPath =
369390tmpPath =
370391
371392
393+ # These options can be used to access the back-end database management
394+ # system Windows registry.
372395[Windows]
373396
374397# Read a Windows registry key value
0 commit comments