From b0928e02c6fe9d10b9c24dc7d2322173a430fe15 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Fri, 3 Dec 2010 10:39:36 +0000 Subject: [PATCH] Proper comment --- lib/utils/resume.py | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/lib/utils/resume.py b/lib/utils/resume.py index f7bef335f..9be4c7875 100644 --- a/lib/utils/resume.py +++ b/lib/utils/resume.py @@ -93,6 +93,7 @@ def resume(expression, payload): This function can be called to resume part or entire output of a SQL injection query output. """ + try: if "sqlmapfile" in expression or "sqlmapoutput" in expression: return None @@ -132,11 +133,11 @@ def resume(expression, payload): return resumedValue - # If we called this function without providing a payload it means that - # we have called it from lib/request/inject __goInband() function - # in UNION query (inband) SQL injection so we return to the calling - # function so that the query output will be retrieved taking advantage - # of the inband SQL injection vulnerability. + # If we called this function without providing a payload it means + # that we have called it from lib/request/inject __goInband() or + # from __goError() function so we return to the calling function + # so that the query output will be retrieved taking advantage + # of either error-based or inband SQL injection vulnerability. if not payload: return None