From 023a80c31cd0a96a04e4714630885a736166a0c5 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Sat, 19 Feb 2011 21:06:24 +0000 Subject: [PATCH] Section explanation change to reflect recent enhancements --- lib/parse/cmdline.py | 14 ++++++-------- sqlmap.conf | 5 ++--- 2 files changed, 8 insertions(+), 11 deletions(-) diff --git a/lib/parse/cmdline.py b/lib/parse/cmdline.py index 7a5f7ad3b..f476a43ed 100644 --- a/lib/parse/cmdline.py +++ b/lib/parse/cmdline.py @@ -177,7 +177,6 @@ def cmdLineParser(): injection.add_option("--tamper", dest="tamper", help="Use given script(s) for tampering injection data") - # Detection options detection = OptionGroup(parser, "Detection", "These options can be " "used to specify how to parse " @@ -205,13 +204,10 @@ def cmdLineParser(): action="store_true", default=False, help="Compare pages based only on their textual content") - # Techniques options techniques = OptionGroup(parser, "Techniques", "These options can " - "be used to test for specific SQL injection " - "technique or to use one of them to exploit " - "the affected parameter(s) rather than using " - "the default blind SQL injection technique.") + "be used to tweak how specific SQL injection " + "techniques are tested.") techniques.add_option("--time-sec", dest="timeSec", type="int", default=TIME_DEFAULT_DELAY, @@ -538,15 +534,17 @@ def cmdLineParser(): parser.add_option_group(miscellaneous) args = [] + for arg in sys.argv: try: args.append(getUnicode(arg, sys.getfilesystemencoding() or sys.stdin.encoding)) except: args.append(getUnicode(arg, UNICODE_ENCODING)) + (args, _) = parser.parse_args(args) - if not args.direct and not args.url and not args.list and not args.googleDork and not args.configFile\ - and not args.requestFile and not args.updateAll and not args.smokeTest and not args.liveTest\ + if not args.direct and not args.url and not args.list and not args.googleDork and not args.configFile \ + and not args.requestFile and not args.updateAll and not args.smokeTest and not args.liveTest \ and not args.realTest: errMsg = "missing a mandatory parameter ('-d', '-u', '-l', '-r', '-g', '-c' or '--update'), " errMsg += "-h for help" diff --git a/sqlmap.conf b/sqlmap.conf index 5f8df1fcc..2ea5ce5dc 100644 --- a/sqlmap.conf +++ b/sqlmap.conf @@ -223,9 +223,8 @@ regexp = textOnly = False -# These options can be used to test for specific SQL injection technique -# or to use one of them to exploit the affected parameter(s) rather than -# using the default blind SQL injection technique. +# These options can be used to tweak how specific SQL injection +# techniques are tested. [Techniques] # Seconds to delay the response from the DBMS.