mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-06-06 14:13:15 +03:00
Minor adjustments
This commit is contained in:
parent
156fdd96ef
commit
a654a426ef
|
@ -48,6 +48,7 @@ from lib.core.convert import urlencode
|
||||||
from lib.core.exception import sqlmapFilePathException
|
from lib.core.exception import sqlmapFilePathException
|
||||||
from lib.core.exception import sqlmapNoneDataException
|
from lib.core.exception import sqlmapNoneDataException
|
||||||
from lib.core.exception import sqlmapSyntaxException
|
from lib.core.exception import sqlmapSyntaxException
|
||||||
|
from lib.core.settings import DESCRIPTION
|
||||||
from lib.core.settings import IS_WIN
|
from lib.core.settings import IS_WIN
|
||||||
from lib.core.settings import SITE
|
from lib.core.settings import SITE
|
||||||
from lib.core.settings import SQL_STATEMENTS
|
from lib.core.settings import SQL_STATEMENTS
|
||||||
|
@ -515,9 +516,9 @@ def banner():
|
||||||
"""
|
"""
|
||||||
|
|
||||||
print """
|
print """
|
||||||
|
%s - %s
|
||||||
%s
|
%s
|
||||||
%s
|
""" % (VERSION_STRING, DESCRIPTION, SITE)
|
||||||
""" % (VERSION_STRING, SITE)
|
|
||||||
|
|
||||||
def parsePasswordHash(password):
|
def parsePasswordHash(password):
|
||||||
blank = " " * 8
|
blank = " " * 8
|
||||||
|
|
|
@ -46,12 +46,12 @@ optDict = {
|
||||||
"aCred": "string",
|
"aCred": "string",
|
||||||
"aCert": "string",
|
"aCert": "string",
|
||||||
"proxy": "string",
|
"proxy": "string",
|
||||||
|
"ignoreProxy": "boolean",
|
||||||
"threads": "integer",
|
"threads": "integer",
|
||||||
"delay": "float",
|
"delay": "float",
|
||||||
"timeout": "float",
|
"timeout": "float",
|
||||||
"retries": "integer",
|
"retries": "integer",
|
||||||
"scope": "string",
|
"scope": "string"
|
||||||
"ignoreProxy": "boolean"
|
|
||||||
},
|
},
|
||||||
|
|
||||||
"Injection": {
|
"Injection": {
|
||||||
|
|
|
@ -28,7 +28,8 @@ import sys
|
||||||
|
|
||||||
# sqlmap version and site
|
# sqlmap version and site
|
||||||
VERSION = "0.8-rc7"
|
VERSION = "0.8-rc7"
|
||||||
VERSION_STRING = "sqlmap/%s - automatic SQL injection and database takeover tool" % VERSION
|
VERSION_STRING = "sqlmap/%s" % VERSION
|
||||||
|
DESCRIPTION = "automatic SQL injection and database takeover tool"
|
||||||
SITE = "http://sqlmap.sourceforge.net"
|
SITE = "http://sqlmap.sourceforge.net"
|
||||||
|
|
||||||
# sqlmap logger
|
# sqlmap logger
|
||||||
|
|
|
@ -111,6 +111,10 @@ def cmdLineParser():
|
||||||
request.add_option("--proxy", dest="proxy",
|
request.add_option("--proxy", dest="proxy",
|
||||||
help="Use a HTTP proxy to connect to the target url")
|
help="Use a HTTP proxy to connect to the target url")
|
||||||
|
|
||||||
|
request.add_option("--ignore-proxy", dest="ignoreProxy",
|
||||||
|
action="store_true",
|
||||||
|
help="Ignore system default HTTP proxy")
|
||||||
|
|
||||||
request.add_option("--threads", dest="threads", type="int", default=1,
|
request.add_option("--threads", dest="threads", type="int", default=1,
|
||||||
help="Maximum number of concurrent HTTP "
|
help="Maximum number of concurrent HTTP "
|
||||||
"requests (default 1)")
|
"requests (default 1)")
|
||||||
|
@ -129,10 +133,6 @@ def cmdLineParser():
|
||||||
request.add_option("--scope", dest="scope",
|
request.add_option("--scope", dest="scope",
|
||||||
help="Regexp to filter targets from provided proxy log")
|
help="Regexp to filter targets from provided proxy log")
|
||||||
|
|
||||||
request.add_option("--ignore-proxy", dest="ignoreProxy",
|
|
||||||
action="store_true",
|
|
||||||
help="Ignore system default HTTP proxy")
|
|
||||||
|
|
||||||
# Injection options
|
# Injection options
|
||||||
injection = OptionGroup(parser, "Injection", "These options can be "
|
injection = OptionGroup(parser, "Injection", "These options can be "
|
||||||
"used to specify which parameters to test "
|
"used to specify which parameters to test "
|
||||||
|
|
|
@ -81,6 +81,10 @@ aCert =
|
||||||
# Syntax: http://address:port
|
# Syntax: http://address:port
|
||||||
proxy =
|
proxy =
|
||||||
|
|
||||||
|
# Ignore system default HTTP proxy
|
||||||
|
# Valid: True or False
|
||||||
|
ignoreProxy = False
|
||||||
|
|
||||||
# Maximum number of concurrent HTTP requests (handled with Python threads)
|
# Maximum number of concurrent HTTP requests (handled with Python threads)
|
||||||
# to be used in the inference SQL injection attack.
|
# to be used in the inference SQL injection attack.
|
||||||
# Valid: integer
|
# Valid: integer
|
||||||
|
@ -107,10 +111,6 @@ retries = 3
|
||||||
# Example: (google|yahoo)
|
# Example: (google|yahoo)
|
||||||
scope =
|
scope =
|
||||||
|
|
||||||
# Ignore system default HTTP proxy
|
|
||||||
# Valid: True or False
|
|
||||||
ignoreProxy = False
|
|
||||||
|
|
||||||
[Injection]
|
[Injection]
|
||||||
|
|
||||||
# Testable parameter(s) comma separated. By default all GET/POST/Cookie
|
# Testable parameter(s) comma separated. By default all GET/POST/Cookie
|
||||||
|
|
Loading…
Reference in New Issue
Block a user