diff --git a/lib/controller/controller.py b/lib/controller/controller.py index de714e4aa..436a3222c 100644 --- a/lib/controller/controller.py +++ b/lib/controller/controller.py @@ -32,7 +32,7 @@ from lib.core.exception import sqlmapUserQuitException from lib.core.session import setInjection from lib.core.target import initTargetEnv from lib.core.target import setupTargetEnv -from lib.core.target import __findPageForms +from lib.core.target import findPageForms from lib.utils.parenthesis import checkForParenthesis def __selectInjection(injData): @@ -93,7 +93,7 @@ def start(): if conf.url: if conf.forms: - __findPageForms() + findPageForms() else: kb.targetUrls.add(( conf.url, conf.method, conf.data, conf.cookie )) diff --git a/lib/core/target.py b/lib/core/target.py index 99ea68870..8fdff3cf2 100644 --- a/lib/core/target.py +++ b/lib/core/target.py @@ -121,7 +121,7 @@ def __setRequestParams(): errMsg += "within the GET, POST and Cookie parameters" raise sqlmapGenericException, errMsg -def __findPageForms(): +def findPageForms(): infoMsg = "searching for forms" logger.info(infoMsg) diff --git a/lib/parse/cmdline.py b/lib/parse/cmdline.py index 99aa2d5ca..a2a3966dc 100644 --- a/lib/parse/cmdline.py +++ b/lib/parse/cmdline.py @@ -198,7 +198,7 @@ def cmdLineParser(): help="Compare pages based only on their textual content") injection.add_option("--tamper", dest="tamper", - help="Use given module(s) for tampering injection data") + help="Use given script(s) for tampering injection data") # Techniques options techniques = OptionGroup(parser, "Techniques", "These options can "