From 190ae4ca1398f8fcb8c5cb7248c83e9d8e0f9226 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Mon, 28 May 2012 15:10:17 +0000 Subject: [PATCH] no need for conf.timeSec value as inference is always evaluated to False in DNS (large random values used for > ...) --- lib/techniques/dns/use.py | 6 ------ 1 file changed, 6 deletions(-) diff --git a/lib/techniques/dns/use.py b/lib/techniques/dns/use.py index c95a4a5e6..7e4709015 100644 --- a/lib/techniques/dns/use.py +++ b/lib/techniques/dns/use.py @@ -20,8 +20,6 @@ from lib.core.common import extractRegexResult from lib.core.common import getSPQLSnippet from lib.core.common import hashDBRetrieve from lib.core.common import hashDBWrite -from lib.core.common import popValue -from lib.core.common import pushValue from lib.core.common import randomInt from lib.core.common import randomStr from lib.core.common import safecharencode @@ -72,9 +70,6 @@ def dnsUse(payload, expression): expressionRequest = getSPQLSnippet(Backend.getIdentifiedDbms(), "dns_request", PREFIX=prefix, QUERY=expressionReplaced, SUFFIX=suffix, DOMAIN=conf.dName) expressionUnescaped = unescaper.unescape(expressionRequest) - pushValue(conf.timeSec) - conf.timeSec = 0 - if Backend.getIdentifiedDbms() in (DBMS.MSSQL, DBMS.PGSQL): comment = queries[Backend.getIdentifiedDbms()].comment.query query = agent.prefixQuery("; %s" % expressionUnescaped) @@ -84,7 +79,6 @@ def dnsUse(payload, expression): forgedPayload = safeStringFormat(payload, (expressionUnescaped, randomInt(1), randomInt(3))) Request.queryPage(forgedPayload, content=False, noteResponseTime=False, raise404=False) - conf.timeSec = popValue() _ = conf.dnsServer.pop(prefix, suffix)