mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 09:36:35 +03:00
grammar fix
This commit is contained in:
parent
edfcddd3c3
commit
a7fbc55748
|
@ -129,7 +129,7 @@ def checkSqlInjection(place, parameter, value):
|
|||
if not any(re.search(conf.testFilter, str(item), re.I) for item in [test.title, test.vector,\
|
||||
test.details.dbms if "details" in test and "dbms" in test.details else ""]):
|
||||
debugMsg = "skipping test '%s' because " % title
|
||||
debugMsg += "it's name/vector/dbms is not included by the given filter"
|
||||
debugMsg += "its name/vector/dbms is not included by the given filter"
|
||||
logger.debug(debugMsg)
|
||||
continue
|
||||
else:
|
||||
|
|
|
@ -1683,7 +1683,7 @@ def readCachedFileContent(filename, mode='rb'):
|
|||
|
||||
def readXmlFile(xmlFile):
|
||||
"""
|
||||
Reads XML file content and returns it's DOM representation
|
||||
Reads XML file content and returns its DOM representation
|
||||
"""
|
||||
|
||||
checkFile(xmlFile)
|
||||
|
@ -2738,7 +2738,7 @@ def safeSQLIdentificatorNaming(name, isTable=False):
|
|||
|
||||
def unsafeSQLIdentificatorNaming(name):
|
||||
"""
|
||||
Extracts identificator's name from it's safe SQL representation
|
||||
Extracts identificator's name from its safe SQL representation
|
||||
"""
|
||||
|
||||
retVal = name
|
||||
|
|
|
@ -160,7 +160,7 @@ def __urllib2Opener():
|
|||
# Reference: http://www.w3.org/Protocols/rfc2616/rfc2616-sec8.html
|
||||
if conf.keepAlive:
|
||||
warnMsg = "persistent HTTP(s) connections, Keep-Alive, has "
|
||||
warnMsg += "been disabled because of it's incompatibility "
|
||||
warnMsg += "been disabled because of its incompatibility "
|
||||
|
||||
if conf.proxy:
|
||||
warnMsg += "with HTTP(s) proxy"
|
||||
|
@ -475,7 +475,7 @@ def __setGoogleDorking():
|
|||
if conf.keepAlive:
|
||||
if conf.proxy:
|
||||
warnMsg = "persistent HTTP(s) connections, Keep-Alive, has "
|
||||
warnMsg += "been disabled because of it's incompatibility "
|
||||
warnMsg += "been disabled because of its incompatibility "
|
||||
warnMsg += "with HTTP(s) proxy"
|
||||
logger.warn(warnMsg)
|
||||
else:
|
||||
|
|
|
@ -54,7 +54,7 @@ def forgeHeaders(items=None):
|
|||
if ("%s=" % cookie.name) in headers[HTTPHEADER.COOKIE]:
|
||||
if kb.mergeCookies is None:
|
||||
message = "you provided a HTTP %s header value. " % HTTPHEADER.COOKIE
|
||||
message += "The target url provided it's own cookies within "
|
||||
message += "The target url provided its own cookies within "
|
||||
message += "the HTTP %s header which intersect with yours. " % HTTPHEADER.SET_COOKIE
|
||||
message += "Do you want to merge them in futher requests? [Y/n] "
|
||||
test = readInput(message, default="Y")
|
||||
|
|
|
@ -663,7 +663,7 @@ class Connect:
|
|||
|
||||
if conf.tor:
|
||||
warnMsg = "it's highly recommended to avoid usage of switch '--tor' for "
|
||||
warnMsg += "time-based injections because of it's high latency time"
|
||||
warnMsg += "time-based injections because of its high latency time"
|
||||
singleTimeWarnMessage(warnMsg)
|
||||
|
||||
warnMsg = "time-based comparison needs larger statistical "
|
||||
|
|
Loading…
Reference in New Issue
Block a user