Trivial text update

This commit is contained in:
Miroslav Stampar 2018-12-28 17:54:58 +01:00
parent de0df99d8e
commit 83972d405f
6 changed files with 10 additions and 10 deletions

View File

@ -19,7 +19,7 @@
* Client OS (e.g. `Microsoft Windows 10`)
* Program version (`python sqlmap.py --version` or `sqlmap --version` depending on installation):
* Target DBMS (e.g. `Microsoft SQL Server`):
* Detected WAF/IDS/IPS protection (e.g. `ModSecurity` or `unknown`):
* Detected WAF/IPS protection (e.g. `ModSecurity` or `unknown`):
* SQLi techniques found by sqlmap (e.g. `error-based` and `boolean-based blind`):
* Results of manual target assessment (e.g. found that the payload `query=test' AND 4113 IN ((SELECT 'foobar'))-- qKLV` works):
* Relevant console output (if any):

View File

@ -19,7 +19,7 @@ from lib.core.enums import DBMS_DIRECTORY_NAME
from lib.core.enums import OS
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
VERSION = "1.2.12.41"
VERSION = "1.2.12.42"
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

View File

@ -753,7 +753,7 @@ answers =
# Valid: True or False
beep = False
# Offline WAF/IPS/IDS payload detection testing.
# Offline WAF/IPS payload detection testing.
# Valid: True or False
checkPayload = False
@ -774,7 +774,7 @@ disableColoring = False
# Default: 1
googlePage = 1
# Make a thorough testing for a WAF/IPS/IDS protection.
# Make a thorough testing for a WAF/IPS protection.
# Valid: True or False
identifyWaf = False
@ -790,7 +790,7 @@ mobile = False
# Valid: True or False
offline = False
# Skip heuristic detection of WAF/IPS/IDS protection.
# Skip heuristic detection of WAF/IPS protection.
# Valid: True or False
skipWaf = False

View File

@ -28,7 +28,7 @@ def tamper(payload, **kwargs):
* MySQL 5.0
Notes:
* Useful to bypass ModSecurity WAF/IDS
* Useful to bypass ModSecurity WAF
>>> import random
>>> random.seed(0)

View File

@ -27,7 +27,7 @@ def tamper(payload, **kwargs):
* MySQL 5.0
Notes:
* Useful to bypass ModSecurity WAF/IDS
* Useful to bypass ModSecurity WAF
>>> tamper('1 AND 2>1--')
'1 /*!00000AND 2>1*/--'

View File

@ -49,7 +49,7 @@ c8c386d644d57c659d74542f5f57f632 lib/core/patch.py
0c3eef46bdbf87e29a3f95f90240d192 lib/core/replication.py
a7db43859b61569b601b97f187dd31c5 lib/core/revision.py
fcb74fcc9577523524659ec49e2e964b lib/core/session.py
eb8b62b1dc94be51a6c3d44d47af8f4a lib/core/settings.py
6781c2fdbfdac0ec5388ca9f06b89b64 lib/core/settings.py
a971ce157d04de96ba6e710d3d38a9a8 lib/core/shell.py
a7edc9250d13af36ac0108f259859c19 lib/core/subprocessng.py
1581be48127a3a7a9fd703359b6e7567 lib/core/target.py
@ -262,8 +262,8 @@ ef0639557a79e57b06296c4bc223ebef tamper/htmlencode.py
2dc49bcd6c55f4e2322b07fa92685356 tamper/least.py
40d1ea0796fd91cb3cdd602e36daed15 tamper/lowercase.py
a54b361da0ac6988d0b97bc79463615d tamper/luanginx.py
1c4d622d1c2c77fc3db1f8b3849467ee tamper/modsecurityversioned.py
f177a624c2cd3431c433769c6eb995e7 tamper/modsecurityzeroversioned.py
82b85a9325ffc22a9fe4003e12c5bc4a tamper/modsecurityversioned.py
0e0f17db797e61f778141a804ab6cd0d tamper/modsecurityzeroversioned.py
91b63afdb96b1d51c12a14cbd425d310 tamper/multiplespaces.py
dcf3458f9010ca41bc4b56804f15792c tamper/overlongutf8more.py
a3a3cef042b864c4226b63f89548f939 tamper/overlongutf8.py