From c35fa63a480056c51e71dea50d416c37447125b3 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Mon, 30 Mar 2015 11:58:09 +0200 Subject: [PATCH] Fixes #1212 --- lib/parse/cmdline.py | 2 +- sqlmap.conf | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/lib/parse/cmdline.py b/lib/parse/cmdline.py index fcb38b54d..1cba1d498 100644 --- a/lib/parse/cmdline.py +++ b/lib/parse/cmdline.py @@ -294,7 +294,7 @@ def cmdLineParser(): "default %d)" % defaults.level) detection.add_option("--risk", dest="risk", type="int", - help="Risk of tests to perform (0-3, " + help="Risk of tests to perform (1-3, " "default %d)" % defaults.level) detection.add_option("--string", dest="string", diff --git a/sqlmap.conf b/sqlmap.conf index 55f298b7a..c4d2eb23c 100644 --- a/sqlmap.conf +++ b/sqlmap.conf @@ -282,7 +282,7 @@ level = 1 # Risk of tests to perform. # Note: boolean-based blind SQL injection tests with AND are considered # risk 1, with OR are considered risk 3. -# Valid: Integer between 0 and 3 +# Valid: Integer between 1 and 3 # Default: 1 risk = 1