mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-11-04 01:47:37 +03:00 
			
		
		
		
	los cosmeticados
This commit is contained in:
		
							parent
							
								
									cc0306044c
								
							
						
					
					
						commit
						99adbbeaa3
					
				| 
						 | 
				
			
			@ -202,12 +202,12 @@ def cmdLineParser():
 | 
			
		|||
 | 
			
		||||
        detection.add_option("--text-only", dest="textOnly",
 | 
			
		||||
                             action="store_true", default=False,
 | 
			
		||||
                             help="Compare pages based only on their textual content")
 | 
			
		||||
                             help="Compare pages based only on the textual content")
 | 
			
		||||
 | 
			
		||||
        # Techniques options
 | 
			
		||||
        techniques = OptionGroup(parser, "Techniques", "These options can "
 | 
			
		||||
                                 "be used to tweak how specific SQL injection "
 | 
			
		||||
                                 "techniques are tested.")
 | 
			
		||||
        techniques = OptionGroup(parser, "Techniques", "These options can be used"
 | 
			
		||||
                                 "to tweak testing of specific SQL injection "
 | 
			
		||||
                                 "techniques.")
 | 
			
		||||
 | 
			
		||||
        techniques.add_option("--time-sec", dest="timeSec",
 | 
			
		||||
                              type="int", default=TIME_DEFAULT_DELAY,
 | 
			
		||||
| 
						 | 
				
			
			@ -218,7 +218,7 @@ def cmdLineParser():
 | 
			
		|||
                              help="Range of columns to test for UNION query SQL injection")
 | 
			
		||||
 | 
			
		||||
        techniques.add_option("--union-char", dest="uChar",
 | 
			
		||||
                              help="Character to use to bruteforce number of columns")
 | 
			
		||||
                              help="Character to use for bruteforcing number of columns")
 | 
			
		||||
 | 
			
		||||
        # Fingerprint options
 | 
			
		||||
        fingerprint = OptionGroup(parser, "Fingerprint")
 | 
			
		||||
| 
						 | 
				
			
			@ -473,7 +473,7 @@ def cmdLineParser():
 | 
			
		|||
 | 
			
		||||
        miscellaneous.add_option("--check-payload", dest="checkPayload",
 | 
			
		||||
                                  action="store_true", default=False,
 | 
			
		||||
                                  help="IDS detection testing of injection payload")
 | 
			
		||||
                                  help="IDS detection testing of injection payloads")
 | 
			
		||||
 | 
			
		||||
        miscellaneous.add_option("--cleanup", dest="cleanup",
 | 
			
		||||
                                  action="store_true", default=False,
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										10
									
								
								sqlmap.conf
									
									
									
									
									
								
							
							
						
						
									
										10
									
								
								sqlmap.conf
									
									
									
									
									
								
							| 
						 | 
				
			
			@ -218,13 +218,13 @@ string =
 | 
			
		|||
# (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
 | 
			
		||||
regexp = 
 | 
			
		||||
 | 
			
		||||
# Compare pages based only on their textual content
 | 
			
		||||
# Compare pages based only on the textual content
 | 
			
		||||
# Valid: True or False
 | 
			
		||||
textOnly = False
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
# These options can be used to tweak how specific SQL injection
 | 
			
		||||
# techniques are tested.
 | 
			
		||||
# These options can be used to tweak testing of specific SQL injection
 | 
			
		||||
# techniques.
 | 
			
		||||
[Techniques]
 | 
			
		||||
 | 
			
		||||
# Seconds to delay the response from the DBMS.
 | 
			
		||||
| 
						 | 
				
			
			@ -237,7 +237,7 @@ timeSec = 5
 | 
			
		|||
# Example: 1-10
 | 
			
		||||
uCols = 
 | 
			
		||||
 | 
			
		||||
# Character to use to bruteforce number of columns
 | 
			
		||||
# Character to use for bruteforcing number of columns
 | 
			
		||||
# Valid: string
 | 
			
		||||
# Example: NULL
 | 
			
		||||
uChar = 
 | 
			
		||||
| 
						 | 
				
			
			@ -507,7 +507,7 @@ batch = False
 | 
			
		|||
# Alert with audio beep when sql injection found.
 | 
			
		||||
beep = False
 | 
			
		||||
 | 
			
		||||
# IDS detection testing of injection payload.
 | 
			
		||||
# IDS detection testing of injection payloads.
 | 
			
		||||
checkPayload = False
 | 
			
		||||
 | 
			
		||||
# Clean up the DBMS by sqlmap specific UDF and tables
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue
	
	Block a user