minor style update

This commit is contained in:
Miroslav Stampar 2012-06-19 08:33:51 +00:00
parent 452ef202ae
commit 302d782a0f
6 changed files with 8 additions and 8 deletions

View File

@ -72,7 +72,7 @@ def checkSqlInjection(place, parameter, value):
# Localized thread data needed for some methods
threadData = getCurrentThreadData()
# Set the flag for sql injection test mode
# Set the flag for SQL injection test mode
kb.testMode = True
for test in getSortedInjectionTests():
@ -647,7 +647,7 @@ def heuristicCheckSqlInjection(place, parameter):
def simpletonCheckSqlInjection(place, parameter, value):
"""
This is a function for the quickest and simplest
sql injection check (e.g. AND 1=1) - only works
SQL injection check (e.g. AND 1=1) - only works
with integer parameters
"""

View File

@ -465,7 +465,7 @@ def start():
logger.info(infoMsg)
continue
infoMsg = "testing sql injection on %s " % place
infoMsg = "testing for SQL injection on %s " % place
infoMsg += "parameter '%s'" % parameter
logger.info(infoMsg)

View File

@ -544,7 +544,7 @@ def paramToDict(place, parameters=None):
or re.search(r'\A9{3,}', testableParameters[parameter]) or re.search(DUMMY_USER_INJECTION, testableParameters[parameter]):
warnMsg = "it appears that you have provided tainted parameter values "
warnMsg += "('%s') with most probably leftover " % element
warnMsg += "chars from manual sql injection "
warnMsg += "chars from manual SQL injection "
warnMsg += "tests (%s) or non-valid numerical value. " % DUMMY_SQL_INJECTION_CHARS
warnMsg += "Please, always use only valid parameter values "
warnMsg += "so sqlmap could be able to properly run "
@ -1966,7 +1966,7 @@ def wasLastRequestDelayed():
Returns True if the last web request resulted in a time-delay
"""
# 99.9999999997440% of all non time-based sql injection affected
# 99.9999999997440% of all non time-based SQL injection affected
# response times should be inside +-7*stdev([normal response times])
# Math reference: http://www.answers.com/topic/standard-deviation

View File

@ -251,7 +251,7 @@ def __setOutputResume():
if not conf.sessionFile:
conf.sessionFile = "%s%ssession" % (conf.outputPath, os.sep)
logger.info("using '%s' as session file" % conf.sessionFile)
logger.info("using '%s' as a session file" % conf.sessionFile)
if os.path.exists(conf.sessionFile):
if not conf.flushSession:

View File

@ -83,7 +83,7 @@ def __oneShotErrorUse(expression, field):
incrementCounter(PAYLOAD.TECHNIQUE.ERROR)
# Parse the returned page to get the exact error-based
# sql injection output
# SQL injection output
output = reduce(lambda x, y: x if x is not None else y, [ \
extractRegexResult(check, page, re.DOTALL | re.IGNORECASE), \
extractRegexResult(check, listToStrValue(headers.headers \

View File

@ -76,7 +76,7 @@ def __oneShotUnionUse(expression, unpack=True, limited=False):
incrementCounter(PAYLOAD.TECHNIQUE.UNION)
# Parse the returned page to get the exact union-based
# sql injection output
# SQL injection output
retVal = reduce(lambda x, y: x if x is not None else y, ( \
extractRegexResult(check, removeReflectiveValues(page, payload), re.DOTALL | re.IGNORECASE), \
extractRegexResult(check, removeReflectiveValues(listToStrValue(headers.headers \