mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 01:26:42 +03:00
Minor cosmetics
This commit is contained in:
parent
4010df307e
commit
ff4e62ff90
|
@ -43,12 +43,12 @@ def cmdLineParser():
|
|||
# Target options
|
||||
target = OptionGroup(parser, "Target", "At least one of these "
|
||||
"options has to be specified to set the source "
|
||||
"to get target urls from")
|
||||
"to get target URLs from")
|
||||
|
||||
target.add_option("-d", dest="direct", help="Direct "
|
||||
"connection to the database")
|
||||
|
||||
target.add_option("-u", "--url", dest="url", help="Target url")
|
||||
target.add_option("-u", "--url", dest="url", help="Target URL (e.g. \"www.target.com/vuln.php?id=1\")")
|
||||
|
||||
target.add_option("-l", dest="logFile", help="Parse targets from Burp "
|
||||
"or WebScarab proxy logs")
|
||||
|
@ -63,14 +63,14 @@ def cmdLineParser():
|
|||
help="Load session from a stored (.sqlite) file")
|
||||
|
||||
target.add_option("-g", dest="googleDork",
|
||||
help="Process Google dork results as target urls")
|
||||
help="Process Google dork results as target URLs")
|
||||
|
||||
target.add_option("-c", dest="configFile",
|
||||
help="Load options from a configuration INI file")
|
||||
|
||||
# Request options
|
||||
request = OptionGroup(parser, "Request", "These options can be used "
|
||||
"to specify how to connect to the target url")
|
||||
"to specify how to connect to the target URL")
|
||||
|
||||
request.add_option("--data", dest="data",
|
||||
help="Data string to be sent through POST")
|
||||
|
@ -124,7 +124,7 @@ def cmdLineParser():
|
|||
"key_file,cert_file)")
|
||||
|
||||
request.add_option("--proxy", dest="proxy",
|
||||
help="Use a HTTP proxy to connect to the target url")
|
||||
help="Use a HTTP proxy to connect to the target URL")
|
||||
|
||||
request.add_option("--proxy-cred", dest="pCred",
|
||||
help="HTTP proxy authentication credentials "
|
||||
|
@ -148,10 +148,10 @@ def cmdLineParser():
|
|||
help="Regexp to filter targets from provided proxy log")
|
||||
|
||||
request.add_option("--safe-url", dest="safUrl",
|
||||
help="Url address to visit frequently during testing")
|
||||
help="URL address to visit frequently during testing")
|
||||
|
||||
request.add_option("--safe-freq", dest="saFreq", type="int",
|
||||
help="Test requests between two visits to a given safe url")
|
||||
help="Test requests between two visits to a given safe URL")
|
||||
|
||||
request.add_option("--skip-urlencode", dest="skipUrlEncode",
|
||||
action="store_true",
|
||||
|
@ -289,7 +289,7 @@ def cmdLineParser():
|
|||
help="Domain name used for DNS exfiltration attack")
|
||||
|
||||
techniques.add_option("--second-order", dest="secondOrder",
|
||||
help="Resulting page url searched for second-order "
|
||||
help="Resulting page URL searched for second-order "
|
||||
"response")
|
||||
|
||||
# Fingerprint options
|
||||
|
@ -539,7 +539,7 @@ def cmdLineParser():
|
|||
help="Check to see if Tor is used properly")
|
||||
|
||||
general.add_option("--crawl", dest="crawlDepth", type="int",
|
||||
help="Crawl the website starting from the target url")
|
||||
help="Crawl the website starting from the target URL")
|
||||
|
||||
general.add_option("--csv-del", dest="csvDel",
|
||||
help="Delimiting character used in CSV output "
|
||||
|
@ -562,7 +562,7 @@ def cmdLineParser():
|
|||
|
||||
general.add_option("--forms", dest="forms",
|
||||
action="store_true",
|
||||
help="Parse and test forms on target url")
|
||||
help="Parse and test forms on target URL")
|
||||
|
||||
general.add_option("--fresh-queries", dest="freshQueries",
|
||||
action="store_true",
|
||||
|
|
24
sqlmap.conf
24
sqlmap.conf
|
@ -1,5 +1,5 @@
|
|||
# At least one of these options has to be specified to set the source to
|
||||
# get target urls from.
|
||||
# get target URLs from.
|
||||
[Target]
|
||||
|
||||
# Direct connection to the database.
|
||||
|
@ -26,7 +26,7 @@ requestFile =
|
|||
# Example: output/www.target.com/session.sqlite
|
||||
sessionFile =
|
||||
|
||||
# Rather than providing a target url, let Google return target
|
||||
# Rather than providing a target URL, let Google return target
|
||||
# hosts as result of your Google dork expression. For a list of Google
|
||||
# dorks see Johnny Long Google Hacking Database at
|
||||
# http://johnny.ihackstuff.com/ghdb.php.
|
||||
|
@ -34,7 +34,7 @@ sessionFile =
|
|||
googleDork =
|
||||
|
||||
|
||||
# These options can be used to specify how to connect to the target url.
|
||||
# These options can be used to specify how to connect to the target URL.
|
||||
[Request]
|
||||
|
||||
# Data string to be sent through POST.
|
||||
|
@ -81,22 +81,22 @@ headers = Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9
|
|||
Accept-Language: en-us,en;q=0.5
|
||||
Accept-Charset: ISO-8859-15,utf-8;q=0.7,*;q=0.7
|
||||
|
||||
# HTTP Authentication type. Useful only if the target url requires
|
||||
# HTTP Authentication type. Useful only if the target URL requires
|
||||
# HTTP Basic, Digest or NTLM authentication and you have such data.
|
||||
# Valid: Basic, Digest or NTLM
|
||||
aType =
|
||||
|
||||
# HTTP authentication credentials. Useful only if the target url requires
|
||||
# HTTP authentication credentials. Useful only if the target URL requires
|
||||
# HTTP Basic, Digest or NTLM authentication and you have such data.
|
||||
# Syntax: username:password
|
||||
aCred =
|
||||
|
||||
# HTTP Authentication certificate. Useful only if the target url requires
|
||||
# HTTP Authentication certificate. Useful only if the target URL requires
|
||||
# logon certificate and you have such data.
|
||||
# Syntax: key_file,cert_file
|
||||
aCert =
|
||||
|
||||
# Use a HTTP proxy to connect to the target url.
|
||||
# Use a HTTP proxy to connect to the target URL.
|
||||
# Syntax: http://address:port
|
||||
proxy =
|
||||
|
||||
|
@ -129,11 +129,11 @@ retries = 3
|
|||
# Example: (google|yahoo)
|
||||
scope =
|
||||
|
||||
# Url address to visit frequently during testing.
|
||||
# URL address to visit frequently during testing.
|
||||
# Example: http://192.168.1.121/index.html
|
||||
safUrl =
|
||||
|
||||
# Test requests between two visits to a given safe url (default 0).
|
||||
# Test requests between two visits to a given safe URL (default 0).
|
||||
# Valid: integer
|
||||
# Default: 0
|
||||
saFreq = 0
|
||||
|
@ -310,7 +310,7 @@ uChar =
|
|||
# Valid: string
|
||||
dnsName =
|
||||
|
||||
# Resulting page url searched for second-order response
|
||||
# Resulting page URL searched for second-order response
|
||||
# Valid: string
|
||||
secondOrder =
|
||||
|
||||
|
@ -582,7 +582,7 @@ charset =
|
|||
# Valid: True or False
|
||||
checkTor = False
|
||||
|
||||
# Crawl the website starting from the target url.
|
||||
# Crawl the website starting from the target URL.
|
||||
# Valid: integer
|
||||
# Default: 0
|
||||
crawlDepth = 0
|
||||
|
@ -612,7 +612,7 @@ eta = False
|
|||
# Valid: True or False
|
||||
flushSession = False
|
||||
|
||||
# Parse and test forms on target url.
|
||||
# Parse and test forms on target URL.
|
||||
# Valid: True or False
|
||||
forms = False
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user