mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-02-13 10:00:36 +03:00
more concise language
This commit is contained in:
parent
138b8039b3
commit
18930539cd
|
@ -291,16 +291,18 @@ def __goInferenceProxy(expression, fromUser=False, expected=None, batch=False, r
|
||||||
stopLimit = 1
|
stopLimit = 1
|
||||||
|
|
||||||
elif (not count or int(count) == 0):
|
elif (not count or int(count) == 0):
|
||||||
warnMsg = "the SQL query provided does not "
|
if not count:
|
||||||
warnMsg += "return any output"
|
warnMsg = "the SQL query provided does not "
|
||||||
logger.warn(warnMsg)
|
warnMsg += "return any output"
|
||||||
|
logger.warn(warnMsg)
|
||||||
|
|
||||||
return None
|
return None
|
||||||
|
|
||||||
elif (not count or int(count) == 0) and (not stopLimit or stopLimit == 0):
|
elif (not count or int(count) == 0) and (not stopLimit or stopLimit == 0):
|
||||||
warnMsg = "the SQL query provided does not "
|
if not count:
|
||||||
warnMsg += "return any output"
|
warnMsg = "the SQL query provided does not "
|
||||||
logger.warn(warnMsg)
|
warnMsg += "return any output"
|
||||||
|
logger.warn(warnMsg)
|
||||||
|
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
|
|
@ -320,9 +320,10 @@ def errorUse(expression, expected=None, resumeValue=True, dump=False):
|
||||||
stopLimit = 1
|
stopLimit = 1
|
||||||
|
|
||||||
elif (not count or int(count) == 0):
|
elif (not count or int(count) == 0):
|
||||||
warnMsg = "the SQL query provided does not "
|
if not count:
|
||||||
warnMsg += "return any output"
|
warnMsg = "the SQL query provided does not "
|
||||||
logger.warn(warnMsg)
|
warnMsg += "return any output"
|
||||||
|
logger.warn(warnMsg)
|
||||||
|
|
||||||
return outputs
|
return outputs
|
||||||
|
|
||||||
|
|
|
@ -261,9 +261,10 @@ def unionUse(expression, unpack=True, dump=False):
|
||||||
stopLimit = 1
|
stopLimit = 1
|
||||||
|
|
||||||
elif (not count or int(count) == 0):
|
elif (not count or int(count) == 0):
|
||||||
warnMsg = "the SQL query provided does not "
|
if not count:
|
||||||
warnMsg += "return any output"
|
warnMsg = "the SQL query provided does not "
|
||||||
logger.warn(warnMsg)
|
warnMsg += "return any output"
|
||||||
|
logger.warn(warnMsg)
|
||||||
|
|
||||||
return value
|
return value
|
||||||
|
|
||||||
|
|
|
@ -315,13 +315,16 @@ def attackCachedUsersPasswords():
|
||||||
|
|
||||||
def attackDumpedTable():
|
def attackDumpedTable():
|
||||||
if kb.data.dumpedTable:
|
if kb.data.dumpedTable:
|
||||||
infoMsg = "analyzing table dump for possible password hashes"
|
|
||||||
logger.info(infoMsg)
|
|
||||||
|
|
||||||
table = kb.data.dumpedTable
|
table = kb.data.dumpedTable
|
||||||
columns = table.keys()
|
columns = table.keys()
|
||||||
count = table["__infos__"]["count"]
|
count = table["__infos__"]["count"]
|
||||||
|
|
||||||
|
if not count:
|
||||||
|
return
|
||||||
|
|
||||||
|
infoMsg = "analyzing table dump for possible password hashes"
|
||||||
|
logger.info(infoMsg)
|
||||||
|
|
||||||
found = False
|
found = False
|
||||||
colUser = ''
|
colUser = ''
|
||||||
colPasswords = set()
|
colPasswords = set()
|
||||||
|
|
Loading…
Reference in New Issue
Block a user