Penetration Testing: A Survival Guide by Halton Wolf & Weaver Bo & Ansari Juned Ahmed & Kotipalli Srinivasa Rao & Imran Mohammed A

Penetration Testing: A Survival Guide by Halton Wolf & Weaver Bo & Ansari Juned Ahmed & Kotipalli Srinivasa Rao & Imran Mohammed A

Author:Halton, Wolf & Weaver, Bo & Ansari, Juned Ahmed & Kotipalli, Srinivasa Rao & Imran, Mohammed A.
Language: eng
Format: epub
Publisher: Packt Publishing
Published: 2017-01-18T05:00:00+00:00


The configuration file stores all the important information related to the injection attack. The URL to be tested is the first option to be defined here. Other important options are to choose between GET and POST method for injecting data and to select time-based or Boolean-based injection mode. Once you have defined the required variables, the configuration file can be provided as an input to the sqlsus tool. The command is as follows:

Sqlsus sqlsys.cnfg

A sample configuration file is as follows:



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.