Skip to content

Commit 7632885

Browse files
committed
reformat the README to markdown
1 parent 599b39a commit 7632885

File tree

1 file changed

+26
-6
lines changed

1 file changed

+26
-6
lines changed

README renamed to README.md

Lines changed: 26 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,42 @@
1-
NoSQLMap v0.1
1+
NoSQLMap
2+
========
3+
4+
v0.1
25
http://www.nosqlmap.net
36

4-
Introduction:
7+
Introduction
8+
============
9+
510
NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases as well as web applications using NoSQL in order to disclose data from the database. It is named as a tribute to Bernardo Damele and Miroslav's Stampar's popular SQL injection tool SQLmap, and its concepts are based on and extensions of Ming Chow's excellent presentation at Defcon 21, "Abusing NoSQL Databases". Presently the tool's exploits are focused around MongoDB, but additional support for other NoSQL based platforms such as CouchDB, Redis, and Cassandra are planned in future releases.
611

7-
Requirements (Varies based on features used):
8-
-Python with PyMongo, httplib2, and urllib available; There are some various other libraries required that a normal Python installation should have readily available. Your milage may vary, check the script.
12+
Requirements
13+
============
914

15+
Varies based on features used:
16+
-Python with PyMongo, httplib2, and urllib available; There are some various other libraries required that a normal Python installation should have readily available. Your milage may vary, check the script.
1017
-Metasploit Framework
1118

1219
Usage:
13-
-Start with ./nosqlmap.py or python nosqlmap.py.
1420

21+
-Start with
22+
23+
```
24+
./nosqlmap.py
25+
```
26+
27+
or
28+
29+
```
30+
python nosqlmap.py.
31+
```
1532
-NoSQLMap uses a menu based system for building attacks. Upon starting NoSQLMap you are presented with with the main menu:
1633

34+
```
1735
1-Set options (do this first)
1836
2-NoSQL DB Access Attacks
1937
3-NoSQL Web App attacks
2038
4-Exit
39+
```
2140

2241
ALWAYS USE OPTION 1 FIRST TO SET THE PARAMETERS!
2342

@@ -29,5 +48,6 @@ Explanation of options
2948
5-Set my local Mongo/Shell IP-Set this option if attacking a MongoDB instance directly to the IP of a target Mongo installation to clone victim databases to or open Meterpreter shells to.
3049
6-Set shell listener port-If opening Meterpreter shells, specify the port.
3150
7-Back to main menu
51+
```
3252
33-
Once options are set head back to the main menu and select DB access attacks or web app attacks as appropriate. Send emails to [email protected] or find me on Twitter @tcstoolHax0r if you have any questions or suggestions.
53+
Once options are set head back to the main menu and select DB access attacks or web app attacks as appropriate. Send emails to [email protected] or find me on Twitter @tcstoolHax0r if you have any questions or suggestions.

0 commit comments

Comments
 (0)