Section explanation change to reflect recent enhancements

This commit is contained in:
Bernardo Damele 2011-02-19 21:06:24 +00:00
parent 60b05ff49f
commit 023a80c31c
2 changed files with 8 additions and 11 deletions

View File

@ -177,7 +177,6 @@ def cmdLineParser():
injection.add_option("--tamper", dest="tamper",
help="Use given script(s) for tampering injection data")
# Detection options
detection = OptionGroup(parser, "Detection", "These options can be "
"used to specify how to parse "
@ -205,13 +204,10 @@ def cmdLineParser():
action="store_true", default=False,
help="Compare pages based only on their textual content")
# Techniques options
techniques = OptionGroup(parser, "Techniques", "These options can "
"be used to test for specific SQL injection "
"technique or to use one of them to exploit "
"the affected parameter(s) rather than using "
"the default blind SQL injection technique.")
"be used to tweak how specific SQL injection "
"techniques are tested.")
techniques.add_option("--time-sec", dest="timeSec",
type="int", default=TIME_DEFAULT_DELAY,
@ -538,11 +534,13 @@ def cmdLineParser():
parser.add_option_group(miscellaneous)
args = []
for arg in sys.argv:
try:
args.append(getUnicode(arg, sys.getfilesystemencoding() or sys.stdin.encoding))
except:
args.append(getUnicode(arg, UNICODE_ENCODING))
(args, _) = parser.parse_args(args)
if not args.direct and not args.url and not args.list and not args.googleDork and not args.configFile \

View File

@ -223,9 +223,8 @@ regexp =
textOnly = False
# These options can be used to test for specific SQL injection technique
# or to use one of them to exploit the affected parameter(s) rather than
# using the default blind SQL injection technique.
# These options can be used to tweak how specific SQL injection
# techniques are tested.
[Techniques]
# Seconds to delay the response from the DBMS.