Hello,

I am writing a small modification which would allow to tamper/decode
variables in the request?
As I understand that the parameters are decoded/parsed into a dict
after option.py:2323 (parseTargetDirect()), but where can I access the
full, parsed dict of the get/post/cookie values?

(specifically I have a base64 encoded string as a parameter and to
insert the payload, the parameter must be base64-decoded, injected and
then encoded back)


--
Konrads Smelkovs
Applied IT sorcery.

------------------------------------------------------------------------------
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to