diff --git a/.gitignore b/.gitignore index ff18ea796..02c75eb01 100644 --- a/.gitignore +++ b/.gitignore @@ -2,4 +2,5 @@ output/ .sqlmap_history traffic.txt -*~ \ No newline at end of file +*~ +.idea/ diff --git a/lib/core/common.py b/lib/core/common.py index 47c72c573..eb9f27c90 100644 --- a/lib/core/common.py +++ b/lib/core/common.py @@ -591,10 +591,10 @@ def paramToDict(place, parameters=None): or re.search(r'\A9{3,}', _) or re.search(r'\A-\d+\Z', _) or re.search(DUMMY_USER_INJECTION, _))\ and not parameter.upper().startswith(GOOGLE_ANALYTICS_COOKIE_PREFIX): warnMsg = "it appears that you have provided tainted parameter values " - warnMsg += "('%s') with most probably leftover " % element + warnMsg += "('%s') probably with leftover " % element warnMsg += "chars/statements from manual SQL injection test(s). " warnMsg += "Please, always use only valid parameter values " - warnMsg += "so sqlmap could be able to run properly" + warnMsg += "so sqlmap will be able to run properly" logger.warn(warnMsg) message = "are you really sure that you want to continue (sqlmap could have problems)? [y/N] " @@ -604,7 +604,7 @@ def paramToDict(place, parameters=None): elif not _: warnMsg = "provided value for parameter '%s' is empty. " % parameter warnMsg += "Please, always use only valid parameter values " - warnMsg += "so sqlmap could be able to run properly" + warnMsg += "so sqlmap will be able to run properly" logger.warn(warnMsg) if place in (PLACE.POST, PLACE.GET): diff --git a/lib/core/target.py b/lib/core/target.py index dd974d9b2..166695e66 100644 --- a/lib/core/target.py +++ b/lib/core/target.py @@ -249,7 +249,7 @@ def _setRequestParams(): if "=%s" % CUSTOM_INJECTION_MARK_CHAR in _: warnMsg = "it seems that you've provided empty parameter value(s) " warnMsg += "for testing. Please, always use only valid parameter values " - warnMsg += "so sqlmap could be able to run properly" + warnMsg += "so sqlmap will be able to run properly" logger.warn(warnMsg) if not kb.processUserMarks: diff --git a/lib/request/connect.py b/lib/request/connect.py index 5ea9bf837..14d40670d 100644 --- a/lib/request/connect.py +++ b/lib/request/connect.py @@ -146,9 +146,9 @@ class Connect(object): if kb.testMode and kb.previousMethod == PAYLOAD.METHOD.TIME: # timed based payloads can cause web server unresponsiveness # if the injectable piece of code is some kind of JOIN-like query - warnMsg = "most probably web server instance hasn't recovered yet " - warnMsg += "from previous timed based payload. If the problem " - warnMsg += "persists please wait for few minutes and rerun " + warnMsg = "most probable cause is that, the web server instance hasn't " + warnMsg += "recovered yet from previous timed based payload. If the problem " + warnMsg += "persists please wait for a few minutes and rerun " warnMsg += "without flag 'T' in option '--technique' " warnMsg += "(e.g. '--flush-session --technique=BEUS') or try to " warnMsg += "lower the value of option '--time-sec' (e.g. '--time-sec=2')" diff --git a/lib/techniques/brute/use.py b/lib/techniques/brute/use.py index d4a7b8c94..27b565bc0 100644 --- a/lib/techniques/brute/use.py +++ b/lib/techniques/brute/use.py @@ -70,8 +70,8 @@ def tableExists(tableFile, regex=None): if result: errMsg = "can't use table existence check because of detected invalid results " - errMsg += "(most probably caused by inability of the used injection " - errMsg += "to distinguish errornous results)" + errMsg += "(most probable cause is by inability of the used injection " + errMsg += "to distinguish erroneous results)" raise SqlmapDataException(errMsg) tables = getFileItems(tableFile, lowercase=Backend.getIdentifiedDbms() in (DBMS.ACCESS,), unique=True) @@ -178,8 +178,8 @@ def columnExists(columnFile, regex=None): if result: errMsg = "can't use column existence check because of detected invalid results " - errMsg += "(most probably caused by inability of the used injection " - errMsg += "to distinguish errornous results)" + errMsg += "(most probable cause is by inability of the used injection " + errMsg += "to distinguish erroneous results)" raise SqlmapDataException(errMsg) infoMsg = "checking column existence using items from '%s'" % columnFile