mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 17:46:37 +03:00
los cosmeticados
This commit is contained in:
parent
cc0306044c
commit
99adbbeaa3
|
@ -202,12 +202,12 @@ def cmdLineParser():
|
||||||
|
|
||||||
detection.add_option("--text-only", dest="textOnly",
|
detection.add_option("--text-only", dest="textOnly",
|
||||||
action="store_true", default=False,
|
action="store_true", default=False,
|
||||||
help="Compare pages based only on their textual content")
|
help="Compare pages based only on the textual content")
|
||||||
|
|
||||||
# Techniques options
|
# Techniques options
|
||||||
techniques = OptionGroup(parser, "Techniques", "These options can "
|
techniques = OptionGroup(parser, "Techniques", "These options can be used"
|
||||||
"be used to tweak how specific SQL injection "
|
"to tweak testing of specific SQL injection "
|
||||||
"techniques are tested.")
|
"techniques.")
|
||||||
|
|
||||||
techniques.add_option("--time-sec", dest="timeSec",
|
techniques.add_option("--time-sec", dest="timeSec",
|
||||||
type="int", default=TIME_DEFAULT_DELAY,
|
type="int", default=TIME_DEFAULT_DELAY,
|
||||||
|
@ -218,7 +218,7 @@ def cmdLineParser():
|
||||||
help="Range of columns to test for UNION query SQL injection")
|
help="Range of columns to test for UNION query SQL injection")
|
||||||
|
|
||||||
techniques.add_option("--union-char", dest="uChar",
|
techniques.add_option("--union-char", dest="uChar",
|
||||||
help="Character to use to bruteforce number of columns")
|
help="Character to use for bruteforcing number of columns")
|
||||||
|
|
||||||
# Fingerprint options
|
# Fingerprint options
|
||||||
fingerprint = OptionGroup(parser, "Fingerprint")
|
fingerprint = OptionGroup(parser, "Fingerprint")
|
||||||
|
@ -473,7 +473,7 @@ def cmdLineParser():
|
||||||
|
|
||||||
miscellaneous.add_option("--check-payload", dest="checkPayload",
|
miscellaneous.add_option("--check-payload", dest="checkPayload",
|
||||||
action="store_true", default=False,
|
action="store_true", default=False,
|
||||||
help="IDS detection testing of injection payload")
|
help="IDS detection testing of injection payloads")
|
||||||
|
|
||||||
miscellaneous.add_option("--cleanup", dest="cleanup",
|
miscellaneous.add_option("--cleanup", dest="cleanup",
|
||||||
action="store_true", default=False,
|
action="store_true", default=False,
|
||||||
|
|
10
sqlmap.conf
10
sqlmap.conf
|
@ -218,13 +218,13 @@ string =
|
||||||
# (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
|
# (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
|
||||||
regexp =
|
regexp =
|
||||||
|
|
||||||
# Compare pages based only on their textual content
|
# Compare pages based only on the textual content
|
||||||
# Valid: True or False
|
# Valid: True or False
|
||||||
textOnly = False
|
textOnly = False
|
||||||
|
|
||||||
|
|
||||||
# These options can be used to tweak how specific SQL injection
|
# These options can be used to tweak testing of specific SQL injection
|
||||||
# techniques are tested.
|
# techniques.
|
||||||
[Techniques]
|
[Techniques]
|
||||||
|
|
||||||
# Seconds to delay the response from the DBMS.
|
# Seconds to delay the response from the DBMS.
|
||||||
|
@ -237,7 +237,7 @@ timeSec = 5
|
||||||
# Example: 1-10
|
# Example: 1-10
|
||||||
uCols =
|
uCols =
|
||||||
|
|
||||||
# Character to use to bruteforce number of columns
|
# Character to use for bruteforcing number of columns
|
||||||
# Valid: string
|
# Valid: string
|
||||||
# Example: NULL
|
# Example: NULL
|
||||||
uChar =
|
uChar =
|
||||||
|
@ -507,7 +507,7 @@ batch = False
|
||||||
# Alert with audio beep when sql injection found.
|
# Alert with audio beep when sql injection found.
|
||||||
beep = False
|
beep = False
|
||||||
|
|
||||||
# IDS detection testing of injection payload.
|
# IDS detection testing of injection payloads.
|
||||||
checkPayload = False
|
checkPayload = False
|
||||||
|
|
||||||
# Clean up the DBMS by sqlmap specific UDF and tables
|
# Clean up the DBMS by sqlmap specific UDF and tables
|
||||||
|
|
Loading…
Reference in New Issue
Block a user