[sqlmap-users] Command line option for resuming sessions
Brought to you by:
inquisb
From: Anton S. <ant...@gm...> - 2012-05-25 23:32:52
|
Hello there, I must be missing something, but shouldn't there be a command line switch to perform the exact same SQLi you did on your target machine? I do realize that the vulnerabilities are stored in $SQLMAP/output/$HOSTNAME/log and are rather easy to replicate, if frustrating. Wouldn't that be easier for the end-users to just add an option to specify the already injected and confirmed server in the command line, as in, for example, ./sqlmap.py -h example.com --dbs? Couldn't find it in the documentation for the life of me. Apologies if it has already been brought up. Thanks, Anton |