From b34fe5c3344d0bd802ab6af5581a5d481cc5cc78 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Mon, 20 Dec 2010 22:49:48 +0000 Subject: [PATCH] no more need for such a huge timeout because any timeout exceptions will now be considered as a successful time-based attack (previously we wanted to get back to the program, hence there was such a huge timeout) --- lib/controller/checks.py | 10 ---------- 1 file changed, 10 deletions(-) diff --git a/lib/controller/checks.py b/lib/controller/checks.py index dc716da3d..9170e4cea 100644 --- a/lib/controller/checks.py +++ b/lib/controller/checks.py @@ -330,13 +330,6 @@ def checkSqlInjection(place, parameter, value): # In case of time-based blind or stacked queries # SQL injections elif method == PAYLOAD.METHOD.TIME: - # Store old value of socket timeout - pushValue(socket.getdefaulttimeout()) - - # Set socket timeout to 2 minutes as some - # time based checks can take awhile - socket.setdefaulttimeout(120) - # Perform the test's request trueResult = Request.queryPage(reqPayload, place, timeBasedCompare=True) @@ -350,9 +343,6 @@ def checkSqlInjection(place, parameter, value): injectable = True - # Restore value of socket timeout - socket.setdefaulttimeout(popValue()) - # If the injection test was successful feed the injection # object with the test's details if injectable is True: