From 6211915da55c52b99aeddd60e2f43f930d7f94d8 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Sat, 16 Oct 2010 22:31:16 +0000 Subject: [PATCH] Cosmetic fix --- lib/controller/controller.py | 4 ++-- lib/core/target.py | 2 +- lib/parse/cmdline.py | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/lib/controller/controller.py b/lib/controller/controller.py index de714e4aa..436a3222c 100644 --- a/lib/controller/controller.py +++ b/lib/controller/controller.py @@ -32,7 +32,7 @@ from lib.core.exception import sqlmapUserQuitException from lib.core.session import setInjection from lib.core.target import initTargetEnv from lib.core.target import setupTargetEnv -from lib.core.target import __findPageForms +from lib.core.target import findPageForms from lib.utils.parenthesis import checkForParenthesis def __selectInjection(injData): @@ -93,7 +93,7 @@ def start(): if conf.url: if conf.forms: - __findPageForms() + findPageForms() else: kb.targetUrls.add(( conf.url, conf.method, conf.data, conf.cookie )) diff --git a/lib/core/target.py b/lib/core/target.py index 99ea68870..8fdff3cf2 100644 --- a/lib/core/target.py +++ b/lib/core/target.py @@ -121,7 +121,7 @@ def __setRequestParams(): errMsg += "within the GET, POST and Cookie parameters" raise sqlmapGenericException, errMsg -def __findPageForms(): +def findPageForms(): infoMsg = "searching for forms" logger.info(infoMsg) diff --git a/lib/parse/cmdline.py b/lib/parse/cmdline.py index 99aa2d5ca..a2a3966dc 100644 --- a/lib/parse/cmdline.py +++ b/lib/parse/cmdline.py @@ -198,7 +198,7 @@ def cmdLineParser(): help="Compare pages based only on their textual content") injection.add_option("--tamper", dest="tamper", - help="Use given module(s) for tampering injection data") + help="Use given script(s) for tampering injection data") # Techniques options techniques = OptionGroup(parser, "Techniques", "These options can "