mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-11-04 09:57:38 +03:00 
			
		
		
		
	Minor language fix
This commit is contained in:
		
							parent
							
								
									6e2fce66aa
								
							
						
					
					
						commit
						f3aa09c794
					
				| 
						 | 
					@ -33,13 +33,13 @@ class ICMPsh:
 | 
				
			||||||
        self.__icmpslave = normalizePath(os.path.join(paths.SQLMAP_EXTRAS_PATH, "icmpsh", "icmpsh.exe"))
 | 
					        self.__icmpslave = normalizePath(os.path.join(paths.SQLMAP_EXTRAS_PATH, "icmpsh", "icmpsh.exe"))
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    def __selectRhost(self):
 | 
					    def __selectRhost(self):
 | 
				
			||||||
        message = "which is the back-end DBMS address? [%s] " % self.remoteIP
 | 
					        message = "what is the back-end DBMS address? [%s] " % self.remoteIP
 | 
				
			||||||
        address = readInput(message, default=self.remoteIP)
 | 
					        address = readInput(message, default=self.remoteIP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
        return address
 | 
					        return address
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    def __selectLhost(self):
 | 
					    def __selectLhost(self):
 | 
				
			||||||
        message = "which is the local address? [%s] " % self.localIP
 | 
					        message = "what is the local address? [%s] " % self.localIP
 | 
				
			||||||
        address = readInput(message, default=self.localIP)
 | 
					        address = readInput(message, default=self.localIP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
        return address
 | 
					        return address
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -269,7 +269,7 @@ class Metasploit:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    def __selectRhost(self):
 | 
					    def __selectRhost(self):
 | 
				
			||||||
        if self.connectionStr.startswith("bind"):
 | 
					        if self.connectionStr.startswith("bind"):
 | 
				
			||||||
            message = "which is the back-end DBMS address? [%s] " % self.remoteIP
 | 
					            message = "what is the back-end DBMS address? [%s] " % self.remoteIP
 | 
				
			||||||
            address = readInput(message, default=self.remoteIP)
 | 
					            address = readInput(message, default=self.remoteIP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
            if not address:
 | 
					            if not address:
 | 
				
			||||||
| 
						 | 
					@ -285,7 +285,7 @@ class Metasploit:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    def __selectLhost(self):
 | 
					    def __selectLhost(self):
 | 
				
			||||||
        if self.connectionStr.startswith("reverse"):
 | 
					        if self.connectionStr.startswith("reverse"):
 | 
				
			||||||
            message = "which is the local address? [%s] " % self.localIP
 | 
					            message = "what is the local address? [%s] " % self.localIP
 | 
				
			||||||
            address = readInput(message, default=self.localIP)
 | 
					            address = readInput(message, default=self.localIP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
            if not address:
 | 
					            if not address:
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -185,7 +185,7 @@ class UDF:
 | 
				
			||||||
            logger.warn(warnMsg)
 | 
					            logger.warn(warnMsg)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
        if not conf.shLib:
 | 
					        if not conf.shLib:
 | 
				
			||||||
            msg = "which is the local path of the shared library? "
 | 
					            msg = "what is the local path of the shared library? "
 | 
				
			||||||
 | 
					
 | 
				
			||||||
            while True:
 | 
					            while True:
 | 
				
			||||||
                self.udfLocalFile = readInput(msg)
 | 
					                self.udfLocalFile = readInput(msg)
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in New Issue
	
	Block a user