Skip to content

Commit f8aa21d

Browse files
committed
Added missing 0.1 options menu documentation
1 parent fbb0c19 commit f8aa21d

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

README.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,9 @@ Explanation of options:
5555
4. Set HTTP Request Method (GET/POST)-Set the request method to a GET or POST; Presently only GET is implemented but working on implementing POST requests exported from Burp.
5656
5. Set my local Mongo/Shell IP-Set this option if attacking a MongoDB instance directly to the IP of a target Mongo installation to clone victim databases to or open Meterpreter shells to.
5757
6. Set shell listener port-If opening Meterpreter shells, specify the port.
58-
7. Back to main menu.
58+
7. Load options file-Load a previously saved set of settings for 1-6.
59+
8. Save options file-Save settings 1-6 for future use.
60+
9. Back to main menu-Use this once the options are set to start your attacks.
5961
```
6062

61-
Once options are set head back to the main menu and select DB access attacks or web app attacks as appropriate. Send emails to tcstool@gmail.com or find me on Twitter [@tcstoolHax0r](https://twitter.com/tcstoolHax0r) if you have any questions or suggestions.
63+
Once options are set head back to the main menu and select DB access attacks or web app attacks as appropriate. The rest of the tool is "wizard" based and fairl self explanatory, but send emails to nosqlmap@gmail.com or find me on Twitter [@tcstoolHax0r](https://twitter.com/tcstoolHax0r) if you have any questions or suggestions.

0 commit comments

Comments
 (0)