diff --git a/extra/vulnserver/vulnserver.py b/extra/vulnserver/vulnserver.py
index 17f8b8008..3106eafeb 100644
--- a/extra/vulnserver/vulnserver.py
+++ b/extra/vulnserver/vulnserver.py
@@ -133,7 +133,7 @@ class ReqHandler(BaseHTTPRequestHandler):
self.send_header("Content-type", "text/html; charset=%s" % UNICODE_ENCODING)
self.send_header("Connection", "close")
self.end_headers()
- self.wfile.write(b"
GET:
link
POST:
")
+ self.wfile.write(b"vulnserverGET:
link
POST:
")
else:
code, output = OK, ""
@@ -228,7 +228,7 @@ def run(address=LISTEN_ADDRESS, port=LISTEN_PORT):
global _server
try:
_server = ThreadingServer((address, port), ReqHandler)
- print("[i] running HTTP server at '%s:%d'" % (address, port))
+ print("[i] running HTTP server at 'http://%s:%d'" % (address, port))
_server.serve_forever()
except KeyboardInterrupt:
_server.socket.close()
diff --git a/lib/controller/checks.py b/lib/controller/checks.py
index 883767ae0..a78b9fd21 100644
--- a/lib/controller/checks.py
+++ b/lib/controller/checks.py
@@ -17,6 +17,7 @@ import time
from extra.beep.beep import beep
from lib.core.agent import agent
from lib.core.common import Backend
+from lib.core.common import dataToStdout
from lib.core.common import extractRegexResult
from lib.core.common import extractTextTagContent
from lib.core.common import filterNone
@@ -1594,7 +1595,10 @@ def checkConnection(suppressOutput=False):
def checkInternet():
content = Request.getPage(url=CHECK_INTERNET_ADDRESS, checking=True)[0]
- return CHECK_INTERNET_VALUE in (content or "")
+ result = CHECK_INTERNET_VALUE in (content or "")
+ if not result and conf.nonInteractive:
+ dataToStdout(repr(content))
+ return result
def setVerbosity(): # Cross-referenced function
raise NotImplementedError
diff --git a/lib/core/settings.py b/lib/core/settings.py
index 33f03357f..cca17ba7d 100644
--- a/lib/core/settings.py
+++ b/lib/core/settings.py
@@ -18,7 +18,7 @@ from lib.core.enums import OS
from thirdparty.six import unichr as _unichr
# sqlmap version (...)
-VERSION = "1.4.5.32"
+VERSION = "1.4.5.33"
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)
diff --git a/lib/core/testing.py b/lib/core/testing.py
index da3b4b260..133f27047 100644
--- a/lib/core/testing.py
+++ b/lib/core/testing.py
@@ -39,9 +39,9 @@ def vulnTest():
TESTS = (
("-h", ("to see full list of options run with '-hh'",)),
- ("-u --flush-session --wizard --check-internet", ("Please choose:", "back-end DBMS: SQLite", "current user is DBA: True", "banner: '3.", "~no connection detected")),
("--dependencies", ("sqlmap requires", "third-party library")),
- (u"-c --flush-session --roles --statements --hostname --privileges --sql-query=\"SELECT '\u0161u\u0107uraj'\" --technique=U", (u": '\u0161u\u0107uraj'", "on SQLite it is not possible")),
+ ("-u --flush-session --wizard", ("Please choose:", "back-end DBMS: SQLite", "current user is DBA: True", "banner: '3.")),
+ (u"-c --flush-session --roles --statements --hostname --privileges --sql-query=\"SELECT '\u0161u\u0107uraj'\" --technique=U --check-internet", (u": '\u0161u\u0107uraj'", "on SQLite it is not possible", "~no connection detected", "~please check your Internet connection")),
(u"-u --flush-session --sql-query=\"SELECT '\u0161u\u0107uraj'\" --technique=B --no-escape --string=luther --unstable", (u": '\u0161u\u0107uraj'",)),
("--dummy", ("all tested parameters do not appear to be injectable", "does not seem to be injectable", "there is not at least one", "~might be injectable")),
("--list-tampers", ("between", "MySQL", "xforwardedfor")),
@@ -87,7 +87,7 @@ def vulnTest():
try:
s.connect((address, port))
s.send(b"GET / HTTP/1.0\r\n\r\n")
- if s.recv(4096):
+ if b"vulnserver" in s.recv(4096):
break
except:
time.sleep(1)