Hello there,

I must be missing something, but shouldn't there be a command line
switch to perform the exact same SQLi you did on your target machine?
I do realize that the vulnerabilities are stored in
$SQLMAP/output/$HOSTNAME/log and are rather easy to replicate, if
frustrating.

Wouldn't that be easier for the end-users to just add an option to
specify the already injected and confirmed server in the command line,
as in, for example, ./sqlmap.py -h example.com --dbs?

Couldn't find it in the documentation for the life of me. Apologies if
it has already been brought up.

Thanks,
Anton

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to