From 8a7214a72ca27891ba449adb179e9169d4b262c8 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Wed, 29 Jan 2020 10:52:27 +0100 Subject: [PATCH] Fix for #4090 --- Usage.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Usage.md b/Usage.md index b5c36aba8..cf76cdff8 100644 --- a/Usage.md +++ b/Usage.md @@ -2248,7 +2248,7 @@ Switch: `--hpp` HTTP parameter pollution (HPP) is a method for bypassing WAF/IPS protection mechanisms (explained [here](https://www.imperva.com/resources/glossary/http-parameter-pollution)) that is particularly effective against ASP/IIS and ASP.NET/IIS platforms. If you suspect that the target is behind such protection, you can try to bypass it by using this switch. -### Make a through testing for a WAF/IPS protection +### Make a thorough testing for a WAF/IPS protection Switch: `--identify-waf` @@ -2361,7 +2361,7 @@ $ python sqlmap.py --purge -v 3 [...] ``` -### Conduct through tests only if positive heuristic(s) +### Conduct thorough tests only if positive heuristic(s) Switch `--smart`