diff --git a/lib/parse/cmdline.py b/lib/parse/cmdline.py index 02bc508df..cc4c26aed 100644 --- a/lib/parse/cmdline.py +++ b/lib/parse/cmdline.py @@ -43,12 +43,12 @@ def cmdLineParser(): # Target options target = OptionGroup(parser, "Target", "At least one of these " "options has to be specified to set the source " - "to get target urls from") + "to get target URLs from") target.add_option("-d", dest="direct", help="Direct " "connection to the database") - target.add_option("-u", "--url", dest="url", help="Target url") + target.add_option("-u", "--url", dest="url", help="Target URL (e.g. \"www.target.com/vuln.php?id=1\")") target.add_option("-l", dest="logFile", help="Parse targets from Burp " "or WebScarab proxy logs") @@ -63,14 +63,14 @@ def cmdLineParser(): help="Load session from a stored (.sqlite) file") target.add_option("-g", dest="googleDork", - help="Process Google dork results as target urls") + help="Process Google dork results as target URLs") target.add_option("-c", dest="configFile", help="Load options from a configuration INI file") # Request options request = OptionGroup(parser, "Request", "These options can be used " - "to specify how to connect to the target url") + "to specify how to connect to the target URL") request.add_option("--data", dest="data", help="Data string to be sent through POST") @@ -124,7 +124,7 @@ def cmdLineParser(): "key_file,cert_file)") request.add_option("--proxy", dest="proxy", - help="Use a HTTP proxy to connect to the target url") + help="Use a HTTP proxy to connect to the target URL") request.add_option("--proxy-cred", dest="pCred", help="HTTP proxy authentication credentials " @@ -148,10 +148,10 @@ def cmdLineParser(): help="Regexp to filter targets from provided proxy log") request.add_option("--safe-url", dest="safUrl", - help="Url address to visit frequently during testing") + help="URL address to visit frequently during testing") request.add_option("--safe-freq", dest="saFreq", type="int", - help="Test requests between two visits to a given safe url") + help="Test requests between two visits to a given safe URL") request.add_option("--skip-urlencode", dest="skipUrlEncode", action="store_true", @@ -289,7 +289,7 @@ def cmdLineParser(): help="Domain name used for DNS exfiltration attack") techniques.add_option("--second-order", dest="secondOrder", - help="Resulting page url searched for second-order " + help="Resulting page URL searched for second-order " "response") # Fingerprint options @@ -539,7 +539,7 @@ def cmdLineParser(): help="Check to see if Tor is used properly") general.add_option("--crawl", dest="crawlDepth", type="int", - help="Crawl the website starting from the target url") + help="Crawl the website starting from the target URL") general.add_option("--csv-del", dest="csvDel", help="Delimiting character used in CSV output " @@ -562,7 +562,7 @@ def cmdLineParser(): general.add_option("--forms", dest="forms", action="store_true", - help="Parse and test forms on target url") + help="Parse and test forms on target URL") general.add_option("--fresh-queries", dest="freshQueries", action="store_true", diff --git a/sqlmap.conf b/sqlmap.conf index a68b47583..974eae48a 100644 --- a/sqlmap.conf +++ b/sqlmap.conf @@ -1,5 +1,5 @@ # At least one of these options has to be specified to set the source to -# get target urls from. +# get target URLs from. [Target] # Direct connection to the database. @@ -26,7 +26,7 @@ requestFile = # Example: output/www.target.com/session.sqlite sessionFile = -# Rather than providing a target url, let Google return target +# Rather than providing a target URL, let Google return target # hosts as result of your Google dork expression. For a list of Google # dorks see Johnny Long Google Hacking Database at # http://johnny.ihackstuff.com/ghdb.php. @@ -34,7 +34,7 @@ sessionFile = googleDork = -# These options can be used to specify how to connect to the target url. +# These options can be used to specify how to connect to the target URL. [Request] # Data string to be sent through POST. @@ -81,22 +81,22 @@ headers = Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9 Accept-Language: en-us,en;q=0.5 Accept-Charset: ISO-8859-15,utf-8;q=0.7,*;q=0.7 -# HTTP Authentication type. Useful only if the target url requires +# HTTP Authentication type. Useful only if the target URL requires # HTTP Basic, Digest or NTLM authentication and you have such data. # Valid: Basic, Digest or NTLM aType = -# HTTP authentication credentials. Useful only if the target url requires +# HTTP authentication credentials. Useful only if the target URL requires # HTTP Basic, Digest or NTLM authentication and you have such data. # Syntax: username:password aCred = -# HTTP Authentication certificate. Useful only if the target url requires +# HTTP Authentication certificate. Useful only if the target URL requires # logon certificate and you have such data. # Syntax: key_file,cert_file aCert = -# Use a HTTP proxy to connect to the target url. +# Use a HTTP proxy to connect to the target URL. # Syntax: http://address:port proxy = @@ -129,11 +129,11 @@ retries = 3 # Example: (google|yahoo) scope = -# Url address to visit frequently during testing. +# URL address to visit frequently during testing. # Example: http://192.168.1.121/index.html safUrl = -# Test requests between two visits to a given safe url (default 0). +# Test requests between two visits to a given safe URL (default 0). # Valid: integer # Default: 0 saFreq = 0 @@ -310,7 +310,7 @@ uChar = # Valid: string dnsName = -# Resulting page url searched for second-order response +# Resulting page URL searched for second-order response # Valid: string secondOrder = @@ -582,7 +582,7 @@ charset = # Valid: True or False checkTor = False -# Crawl the website starting from the target url. +# Crawl the website starting from the target URL. # Valid: integer # Default: 0 crawlDepth = 0 @@ -612,7 +612,7 @@ eta = False # Valid: True or False flushSession = False -# Parse and test forms on target url. +# Parse and test forms on target URL. # Valid: True or False forms = False