mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 09:36:35 +03:00
Cosmetic fix
This commit is contained in:
parent
cfa5655150
commit
6211915da5
|
@ -32,7 +32,7 @@ from lib.core.exception import sqlmapUserQuitException
|
|||
from lib.core.session import setInjection
|
||||
from lib.core.target import initTargetEnv
|
||||
from lib.core.target import setupTargetEnv
|
||||
from lib.core.target import __findPageForms
|
||||
from lib.core.target import findPageForms
|
||||
from lib.utils.parenthesis import checkForParenthesis
|
||||
|
||||
def __selectInjection(injData):
|
||||
|
@ -93,7 +93,7 @@ def start():
|
|||
|
||||
if conf.url:
|
||||
if conf.forms:
|
||||
__findPageForms()
|
||||
findPageForms()
|
||||
else:
|
||||
kb.targetUrls.add(( conf.url, conf.method, conf.data, conf.cookie ))
|
||||
|
||||
|
|
|
@ -121,7 +121,7 @@ def __setRequestParams():
|
|||
errMsg += "within the GET, POST and Cookie parameters"
|
||||
raise sqlmapGenericException, errMsg
|
||||
|
||||
def __findPageForms():
|
||||
def findPageForms():
|
||||
infoMsg = "searching for forms"
|
||||
logger.info(infoMsg)
|
||||
|
||||
|
|
|
@ -198,7 +198,7 @@ def cmdLineParser():
|
|||
help="Compare pages based only on their textual content")
|
||||
|
||||
injection.add_option("--tamper", dest="tamper",
|
||||
help="Use given module(s) for tampering injection data")
|
||||
help="Use given script(s) for tampering injection data")
|
||||
|
||||
# Techniques options
|
||||
techniques = OptionGroup(parser, "Techniques", "These options can "
|
||||
|
|
Loading…
Reference in New Issue
Block a user