diff --git a/lib/parse/cmdline.py b/lib/parse/cmdline.py index 547bece8b..a9be1f0f3 100644 --- a/lib/parse/cmdline.py +++ b/lib/parse/cmdline.py @@ -202,12 +202,12 @@ def cmdLineParser(): detection.add_option("--text-only", dest="textOnly", action="store_true", default=False, - help="Compare pages based only on their textual content") + help="Compare pages based only on the textual content") # Techniques options - techniques = OptionGroup(parser, "Techniques", "These options can " - "be used to tweak how specific SQL injection " - "techniques are tested.") + techniques = OptionGroup(parser, "Techniques", "These options can be used" + "to tweak testing of specific SQL injection " + "techniques.") techniques.add_option("--time-sec", dest="timeSec", type="int", default=TIME_DEFAULT_DELAY, @@ -218,7 +218,7 @@ def cmdLineParser(): help="Range of columns to test for UNION query SQL injection") techniques.add_option("--union-char", dest="uChar", - help="Character to use to bruteforce number of columns") + help="Character to use for bruteforcing number of columns") # Fingerprint options fingerprint = OptionGroup(parser, "Fingerprint") @@ -473,7 +473,7 @@ def cmdLineParser(): miscellaneous.add_option("--check-payload", dest="checkPayload", action="store_true", default=False, - help="IDS detection testing of injection payload") + help="IDS detection testing of injection payloads") miscellaneous.add_option("--cleanup", dest="cleanup", action="store_true", default=False, diff --git a/sqlmap.conf b/sqlmap.conf index 3e5480ef3..84f3a83df 100644 --- a/sqlmap.conf +++ b/sqlmap.conf @@ -218,13 +218,13 @@ string = # (http://www.python.org/doc/2.5.2/lib/re-syntax.html) regexp = -# Compare pages based only on their textual content +# Compare pages based only on the textual content # Valid: True or False textOnly = False -# These options can be used to tweak how specific SQL injection -# techniques are tested. +# These options can be used to tweak testing of specific SQL injection +# techniques. [Techniques] # Seconds to delay the response from the DBMS. @@ -237,7 +237,7 @@ timeSec = 5 # Example: 1-10 uCols = -# Character to use to bruteforce number of columns +# Character to use for bruteforcing number of columns # Valid: string # Example: NULL uChar = @@ -507,7 +507,7 @@ batch = False # Alert with audio beep when sql injection found. beep = False -# IDS detection testing of injection payload. +# IDS detection testing of injection payloads. checkPayload = False # Clean up the DBMS by sqlmap specific UDF and tables