los cosmeticados

This commit is contained in:
Miroslav Stampar 2011-03-07 22:04:17 +00:00
parent cc0306044c
commit 99adbbeaa3
2 changed files with 11 additions and 11 deletions

View File

@ -202,12 +202,12 @@ def cmdLineParser():
detection.add_option("--text-only", dest="textOnly", detection.add_option("--text-only", dest="textOnly",
action="store_true", default=False, action="store_true", default=False,
help="Compare pages based only on their textual content") help="Compare pages based only on the textual content")
# Techniques options # Techniques options
techniques = OptionGroup(parser, "Techniques", "These options can " techniques = OptionGroup(parser, "Techniques", "These options can be used"
"be used to tweak how specific SQL injection " "to tweak testing of specific SQL injection "
"techniques are tested.") "techniques.")
techniques.add_option("--time-sec", dest="timeSec", techniques.add_option("--time-sec", dest="timeSec",
type="int", default=TIME_DEFAULT_DELAY, type="int", default=TIME_DEFAULT_DELAY,
@ -218,7 +218,7 @@ def cmdLineParser():
help="Range of columns to test for UNION query SQL injection") help="Range of columns to test for UNION query SQL injection")
techniques.add_option("--union-char", dest="uChar", techniques.add_option("--union-char", dest="uChar",
help="Character to use to bruteforce number of columns") help="Character to use for bruteforcing number of columns")
# Fingerprint options # Fingerprint options
fingerprint = OptionGroup(parser, "Fingerprint") fingerprint = OptionGroup(parser, "Fingerprint")
@ -473,7 +473,7 @@ def cmdLineParser():
miscellaneous.add_option("--check-payload", dest="checkPayload", miscellaneous.add_option("--check-payload", dest="checkPayload",
action="store_true", default=False, action="store_true", default=False,
help="IDS detection testing of injection payload") help="IDS detection testing of injection payloads")
miscellaneous.add_option("--cleanup", dest="cleanup", miscellaneous.add_option("--cleanup", dest="cleanup",
action="store_true", default=False, action="store_true", default=False,

View File

@ -218,13 +218,13 @@ string =
# (http://www.python.org/doc/2.5.2/lib/re-syntax.html) # (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
regexp = regexp =
# Compare pages based only on their textual content # Compare pages based only on the textual content
# Valid: True or False # Valid: True or False
textOnly = False textOnly = False
# These options can be used to tweak how specific SQL injection # These options can be used to tweak testing of specific SQL injection
# techniques are tested. # techniques.
[Techniques] [Techniques]
# Seconds to delay the response from the DBMS. # Seconds to delay the response from the DBMS.
@ -237,7 +237,7 @@ timeSec = 5
# Example: 1-10 # Example: 1-10
uCols = uCols =
# Character to use to bruteforce number of columns # Character to use for bruteforcing number of columns
# Valid: string # Valid: string
# Example: NULL # Example: NULL
uChar = uChar =
@ -507,7 +507,7 @@ batch = False
# Alert with audio beep when sql injection found. # Alert with audio beep when sql injection found.
beep = False beep = False
# IDS detection testing of injection payload. # IDS detection testing of injection payloads.
checkPayload = False checkPayload = False
# Clean up the DBMS by sqlmap specific UDF and tables # Clean up the DBMS by sqlmap specific UDF and tables