Minor update

This commit is contained in:
stamparm 2013-04-30 14:05:50 +02:00
parent 69e3a2cb9e
commit 08fbfda5d2
3 changed files with 12 additions and 12 deletions

View File

@ -62,6 +62,7 @@ optDict = {
"testParameter": "string",
"skip": "string",
"dbms": "string",
"dbmsCred": "string",
"os": "string",
"invalidBignum": "boolean",
"invalidLogical": "boolean",
@ -175,7 +176,6 @@ optDict = {
"checkTor": "boolean",
"crawlDepth": "integer",
"csvDel": "string",
"dbmsCred": "string",
"dumpFormat": "string",
"eta": "boolean",
"flushSession": "boolean",

View File

@ -198,6 +198,9 @@ def cmdLineParser():
injection.add_option("--dbms", dest="dbms",
help="Force back-end DBMS to this value")
injection.add_option("--dbms-cred", dest="dbmsCred",
help="DBMS authentication credentials (user:password)")
injection.add_option("--os", dest="os",
help="Force back-end DBMS operating system "
"to this value")
@ -549,9 +552,6 @@ def cmdLineParser():
help="Delimiting character used in CSV output "
"(default \"%s\")" % defaults.csvDel)
general.add_option("--dbms-cred", dest="dbmsCred",
help="DBMS authentication credentials (user:password)")
general.add_option("--dump-format", dest="dumpFormat",
help="Format of dumped data (CSV (default), HTML or SQLITE)")

View File

@ -185,6 +185,14 @@ skip =
# access, firebird, maxdb, sybase
dbms =
# DBMS authentication credentials (user:password). Useful if you want to
# run SQL statements as another user, the back-end database management
# system is PostgreSQL or Microsoft SQL Server and the parameter is
# vulnerable by stacked queries SQL injection or you are connecting directly
# to the DBMS (-d switch).
# Syntax: username:password
dbmsCred =
# Force back-end DBMS operating system to this value. If this option is
# set, the back-end DBMS identification process will be minimized as
# needed.
@ -596,14 +604,6 @@ crawlDepth = 0
# Default: ,
csvDel = ,
# DBMS authentication credentials (user:password). Useful if you want to
# run SQL statements as another user, the back-end database management
# system is PostgreSQL or Microsoft SQL Server and the parameter is
# vulnerable by stacked queries SQL injection or you are connecting directly
# to the DBMS (-d switch).
# Syntax: username:password
dbmsCred =
# Format of dumped data
# Valid: CSV, HTML or SQLITE
dumpFormat = CSV