kids, don't use this at home

This commit is contained in:
Miroslav Stampar 2010-12-20 10:13:14 +00:00
parent 13d5b2c0ff
commit 10a7a2dfb2
3 changed files with 8 additions and 1 deletions

View File

@ -463,6 +463,8 @@ def heuristicCheckSqlInjection(place, parameter, value):
infoMsg += "not be injectable"
logger.warn(infoMsg)
return result
def checkDynParam(place, parameter, value):
"""
This function checks if the url parameter is dynamic. If it is

View File

@ -339,7 +339,9 @@ def start():
kb.testedParams.add(paramKey)
if testSqlInj:
heuristicCheckSqlInjection(place, parameter, value)
check = heuristicCheckSqlInjection(place, parameter, value)
if not check and conf.scriptKiddie:
continue
logMsg = "testing sql injection on %s " % place
logMsg += "parameter '%s'" % parameter

View File

@ -532,6 +532,9 @@ def cmdLineParser():
parser.add_option("--technique", dest="technique", type="int",
default=False, help=SUPPRESS_HELP)
parser.add_option("--script-kiddie", dest="scriptKiddie", action="store_true",
default=False, help=SUPPRESS_HELP)
parser.add_option_group(target)
parser.add_option_group(request)
parser.add_option_group(optimization)