mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 09:36:35 +03:00
Removing trailing whitespaces (PEP8)
This commit is contained in:
parent
82b468211d
commit
5b77b20e2e
|
@ -365,7 +365,7 @@ def start():
|
|||
# a warning message to the user in case the page is not stable
|
||||
checkStability()
|
||||
|
||||
# Do a little prioritization reorder of a testable parameter list
|
||||
# Do a little prioritization reorder of a testable parameter list
|
||||
parameters = conf.parameters.keys()
|
||||
|
||||
# Order of testing list (last to first)
|
||||
|
|
|
@ -24,7 +24,7 @@ class SORT_ORDER:
|
|||
|
||||
class DBMS:
|
||||
ACCESS = "Microsoft Access"
|
||||
DB2 = "IBM DB2"
|
||||
DB2 = "IBM DB2"
|
||||
FIREBIRD = "Firebird"
|
||||
MAXDB = "SAP MaxDB"
|
||||
MSSQL = "Microsoft SQL Server"
|
||||
|
|
|
@ -34,7 +34,7 @@ def blockingReadFromFD(fd):
|
|||
# Uncomment the following line if the process seems to
|
||||
# take a huge amount of cpu time
|
||||
# time.sleep(0.01)
|
||||
continue
|
||||
continue
|
||||
else:
|
||||
raise
|
||||
break
|
||||
|
@ -52,9 +52,9 @@ def blockingWriteToFD(fd, data):
|
|||
wrote_data = os.write(fd, data)
|
||||
except (OSError, IOError), io:
|
||||
if io.errno in (errno.EAGAIN, errno.EINTR):
|
||||
continue
|
||||
continue
|
||||
else:
|
||||
raise
|
||||
raise
|
||||
|
||||
if wrote_data < data_length:
|
||||
blockingWriteToFD(fd, data[wrote_data:])
|
||||
|
|
|
@ -17,8 +17,8 @@ class HTTPRangeHandler(urllib2.BaseHandler):
|
|||
Reference: http://stackoverflow.com/questions/1971240/python-seek-on-remote-file
|
||||
|
||||
This was extremely simple. The Range header is a HTTP feature to
|
||||
begin with so all this class does is tell urllib2 that the
|
||||
"206 Partial Content" response from the HTTP server is what we
|
||||
begin with so all this class does is tell urllib2 that the
|
||||
"206 Partial Content" response from the HTTP server is what we
|
||||
expected.
|
||||
|
||||
Example:
|
||||
|
|
|
@ -11,7 +11,7 @@ from plugins.generic.enumeration import Enumeration as GenericEnumeration
|
|||
|
||||
class Enumeration(GenericEnumeration):
|
||||
def __init__(self):
|
||||
GenericEnumeration.__init__(self)
|
||||
GenericEnumeration.__init__(self)
|
||||
|
||||
def getPasswordHashes(self):
|
||||
warnMsg = "on DB2 it is not possible to list password hashes"
|
||||
|
|
|
@ -261,22 +261,22 @@ class Filesystem(GenericFilesystem):
|
|||
Set file = fs.GetFile(inputFilePath)
|
||||
If file.Size Then
|
||||
Wscript.Echo "Loading from: " & inputFilePath
|
||||
Wscript.Echo
|
||||
Wscript.Echo
|
||||
Set fd = fs.OpenTextFile(inputFilePath, 1)
|
||||
data = fd.ReadAll
|
||||
fd.Close
|
||||
data = Replace(data, " ", "")
|
||||
data = Replace(data, vbCr, "")
|
||||
data = Replace(data, vbLf, "")
|
||||
Wscript.Echo "Fixed Input: "
|
||||
Wscript.Echo "Fixed Input: "
|
||||
Wscript.Echo data
|
||||
Wscript.Echo
|
||||
Wscript.Echo
|
||||
decodedData = base64_decode(data)
|
||||
Wscript.Echo "Output: "
|
||||
Wscript.Echo "Output: "
|
||||
Wscript.Echo decodedData
|
||||
Wscript.Echo
|
||||
Wscript.Echo
|
||||
Wscript.Echo "Writing output in: " & outputFilePath
|
||||
Wscript.Echo
|
||||
Wscript.Echo
|
||||
Set ofs = CreateObject("Scripting.FileSystemObject").OpenTextFile(outputFilePath, 2, True)
|
||||
ofs.Write decodedData
|
||||
ofs.close
|
||||
|
|
|
@ -22,7 +22,7 @@ def tamper(payload, **kwargs):
|
|||
|
||||
Example:
|
||||
* Input: UNION SELECT
|
||||
* Output: UNION SELECT
|
||||
* Output: UNION SELECT
|
||||
|
||||
Notes:
|
||||
* Useful to bypass very weak and bespoke web application firewalls
|
||||
|
|
|
@ -51,7 +51,7 @@ def tamper(payload, **kwargs):
|
|||
else:
|
||||
return match.group()
|
||||
|
||||
retVal = ""
|
||||
retVal = ""
|
||||
|
||||
if payload:
|
||||
payload = re.sub(r"(?<=\W)(?P<word>[A-Za-z_]+)(?=\W|\Z)", lambda match: process(match), payload)
|
||||
|
|
|
@ -42,16 +42,16 @@ def tamper(payload, **kwargs):
|
|||
# STX 02 start of text
|
||||
# ETX 03 end of text
|
||||
# EOT 04 end of transmission
|
||||
# ENQ 05 enquiry
|
||||
# ACK 06 acknowledge
|
||||
# ENQ 05 enquiry
|
||||
# ACK 06 acknowledge
|
||||
# BEL 07 bell
|
||||
# BS 08 backspace
|
||||
# TAB 09 horizontal tab
|
||||
# LF 0A new line
|
||||
# VT 0B vertical TAB
|
||||
# FF 0C new page
|
||||
# CR 0D carriage return
|
||||
# SO 0E shift out
|
||||
# VT 0B vertical TAB
|
||||
# FF 0C new page
|
||||
# CR 0D carriage return
|
||||
# SO 0E shift out
|
||||
# SI 0F shift in
|
||||
blanks = ('%01', '%02', '%03', '%04', '%05', '%06', '%07', '%08', '%09', '%0B', '%0C', '%0D', '%0E', '%0F', '%0A')
|
||||
retVal = payload
|
||||
|
@ -82,7 +82,7 @@ def tamper(payload, **kwargs):
|
|||
else:
|
||||
retVal += random.choice(blanks)
|
||||
|
||||
continue
|
||||
continue
|
||||
|
||||
retVal += payload[i]
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user