From 770b1523ff5c88698f09d273404b4cdcdb51b981 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Thu, 21 Apr 2011 21:31:16 +0000 Subject: [PATCH] More verbose output when no SQL injections are detected --- lib/controller/controller.py | 15 ++++++++++++++- 1 file changed, 14 insertions(+), 1 deletion(-) diff --git a/lib/controller/controller.py b/lib/controller/controller.py index 0332fa95a..c03e78fe4 100644 --- a/lib/controller/controller.py +++ b/lib/controller/controller.py @@ -441,7 +441,20 @@ def start(): errMsg += " Give it a go with the --text-only switch " errMsg += "if the target page has a low percentage of " errMsg += "textual content (~%.2f%% of " % percent - errMsg += "page content is text)" + errMsg += "page content is text)." + + if not conf.string and not conf.regexp: + errMsg += " Rerun by providing either a valid --string " + errMsg += "or a valid --regexp, refer to the user's " + errMsg += "manual for details" + elif conf.string: + errMsg += " Rerun by providing a valid --string, perhaps " + errMsg += "the string that you have choosen does not match " + errMsg += "only on True responses" + elif conf.regexp: + errMsg += " Rerun by providing a valid --regexp, perhaps " + errMsg += "the regular expression that you have choosen " + errMsg += "does not match only on True responses" raise sqlmapNotVulnerableException, errMsg else: