Pseudo-static popular point is false static page, that is, through a variety of technical means, so that the dynamic page URL looks like static page.
In general, we choose to transfer or to play by hand ...
I saw the example of Sqlmap encountering URL rewriting today.
"When I saw the big English in high school, I found it very useful to take a look at the official FAQ Doc PDF document When I got a tool.
Url_rewrite This question has been asked at home and abroad.
D:\cygwin\pentest\database\sqlmap\doc \faq.pdf
Here is the official answer.
1.15 How to use Sqlmap with mod_rewrite enabled?
Append an asterisk, *, to the place where sqlmap should check for injections in
URI itself. For example,./sqlmap.py-u "Http://target.tld/id1/1*/id2/2″,
Sqlmap would inject its payloads at the place marked with * character. This
Feature also applies to POST data. Multiple injection points is supported and
would be assessed sequentially.
Where there is injection, add the * number.
./sqlmap.py-u "Http://www.cunlide.com/id1/1*/id2/2″
Injection page: http://www.xxx.org/news/class/?103.htm
Command: Python sqlmap.py-u "http://www.xxx.org/news/class/?103*.html"
Sqlmap pseudo Static injection