Minor cosmetics

This commit is contained in:
Miroslav Stampar 2013-03-15 17:00:01 +01:00
parent 4010df307e
commit ff4e62ff90
2 changed files with 22 additions and 22 deletions

View File

@ -43,12 +43,12 @@ def cmdLineParser():
# Target options # Target options
target = OptionGroup(parser, "Target", "At least one of these " target = OptionGroup(parser, "Target", "At least one of these "
"options has to be specified to set the source " "options has to be specified to set the source "
"to get target urls from") "to get target URLs from")
target.add_option("-d", dest="direct", help="Direct " target.add_option("-d", dest="direct", help="Direct "
"connection to the database") "connection to the database")
target.add_option("-u", "--url", dest="url", help="Target url") target.add_option("-u", "--url", dest="url", help="Target URL (e.g. \"www.target.com/vuln.php?id=1\")")
target.add_option("-l", dest="logFile", help="Parse targets from Burp " target.add_option("-l", dest="logFile", help="Parse targets from Burp "
"or WebScarab proxy logs") "or WebScarab proxy logs")
@ -63,14 +63,14 @@ def cmdLineParser():
help="Load session from a stored (.sqlite) file") help="Load session from a stored (.sqlite) file")
target.add_option("-g", dest="googleDork", target.add_option("-g", dest="googleDork",
help="Process Google dork results as target urls") help="Process Google dork results as target URLs")
target.add_option("-c", dest="configFile", target.add_option("-c", dest="configFile",
help="Load options from a configuration INI file") help="Load options from a configuration INI file")
# Request options # Request options
request = OptionGroup(parser, "Request", "These options can be used " request = OptionGroup(parser, "Request", "These options can be used "
"to specify how to connect to the target url") "to specify how to connect to the target URL")
request.add_option("--data", dest="data", request.add_option("--data", dest="data",
help="Data string to be sent through POST") help="Data string to be sent through POST")
@ -124,7 +124,7 @@ def cmdLineParser():
"key_file,cert_file)") "key_file,cert_file)")
request.add_option("--proxy", dest="proxy", request.add_option("--proxy", dest="proxy",
help="Use a HTTP proxy to connect to the target url") help="Use a HTTP proxy to connect to the target URL")
request.add_option("--proxy-cred", dest="pCred", request.add_option("--proxy-cred", dest="pCred",
help="HTTP proxy authentication credentials " help="HTTP proxy authentication credentials "
@ -148,10 +148,10 @@ def cmdLineParser():
help="Regexp to filter targets from provided proxy log") help="Regexp to filter targets from provided proxy log")
request.add_option("--safe-url", dest="safUrl", request.add_option("--safe-url", dest="safUrl",
help="Url address to visit frequently during testing") help="URL address to visit frequently during testing")
request.add_option("--safe-freq", dest="saFreq", type="int", request.add_option("--safe-freq", dest="saFreq", type="int",
help="Test requests between two visits to a given safe url") help="Test requests between two visits to a given safe URL")
request.add_option("--skip-urlencode", dest="skipUrlEncode", request.add_option("--skip-urlencode", dest="skipUrlEncode",
action="store_true", action="store_true",
@ -289,7 +289,7 @@ def cmdLineParser():
help="Domain name used for DNS exfiltration attack") help="Domain name used for DNS exfiltration attack")
techniques.add_option("--second-order", dest="secondOrder", techniques.add_option("--second-order", dest="secondOrder",
help="Resulting page url searched for second-order " help="Resulting page URL searched for second-order "
"response") "response")
# Fingerprint options # Fingerprint options
@ -539,7 +539,7 @@ def cmdLineParser():
help="Check to see if Tor is used properly") help="Check to see if Tor is used properly")
general.add_option("--crawl", dest="crawlDepth", type="int", general.add_option("--crawl", dest="crawlDepth", type="int",
help="Crawl the website starting from the target url") help="Crawl the website starting from the target URL")
general.add_option("--csv-del", dest="csvDel", general.add_option("--csv-del", dest="csvDel",
help="Delimiting character used in CSV output " help="Delimiting character used in CSV output "
@ -562,7 +562,7 @@ def cmdLineParser():
general.add_option("--forms", dest="forms", general.add_option("--forms", dest="forms",
action="store_true", action="store_true",
help="Parse and test forms on target url") help="Parse and test forms on target URL")
general.add_option("--fresh-queries", dest="freshQueries", general.add_option("--fresh-queries", dest="freshQueries",
action="store_true", action="store_true",

View File

@ -1,5 +1,5 @@
# At least one of these options has to be specified to set the source to # At least one of these options has to be specified to set the source to
# get target urls from. # get target URLs from.
[Target] [Target]
# Direct connection to the database. # Direct connection to the database.
@ -26,7 +26,7 @@ requestFile =
# Example: output/www.target.com/session.sqlite # Example: output/www.target.com/session.sqlite
sessionFile = sessionFile =
# Rather than providing a target url, let Google return target # Rather than providing a target URL, let Google return target
# hosts as result of your Google dork expression. For a list of Google # hosts as result of your Google dork expression. For a list of Google
# dorks see Johnny Long Google Hacking Database at # dorks see Johnny Long Google Hacking Database at
# http://johnny.ihackstuff.com/ghdb.php. # http://johnny.ihackstuff.com/ghdb.php.
@ -34,7 +34,7 @@ sessionFile =
googleDork = googleDork =
# These options can be used to specify how to connect to the target url. # These options can be used to specify how to connect to the target URL.
[Request] [Request]
# Data string to be sent through POST. # Data string to be sent through POST.
@ -81,22 +81,22 @@ headers = Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9
Accept-Language: en-us,en;q=0.5 Accept-Language: en-us,en;q=0.5
Accept-Charset: ISO-8859-15,utf-8;q=0.7,*;q=0.7 Accept-Charset: ISO-8859-15,utf-8;q=0.7,*;q=0.7
# HTTP Authentication type. Useful only if the target url requires # HTTP Authentication type. Useful only if the target URL requires
# HTTP Basic, Digest or NTLM authentication and you have such data. # HTTP Basic, Digest or NTLM authentication and you have such data.
# Valid: Basic, Digest or NTLM # Valid: Basic, Digest or NTLM
aType = aType =
# HTTP authentication credentials. Useful only if the target url requires # HTTP authentication credentials. Useful only if the target URL requires
# HTTP Basic, Digest or NTLM authentication and you have such data. # HTTP Basic, Digest or NTLM authentication and you have such data.
# Syntax: username:password # Syntax: username:password
aCred = aCred =
# HTTP Authentication certificate. Useful only if the target url requires # HTTP Authentication certificate. Useful only if the target URL requires
# logon certificate and you have such data. # logon certificate and you have such data.
# Syntax: key_file,cert_file # Syntax: key_file,cert_file
aCert = aCert =
# Use a HTTP proxy to connect to the target url. # Use a HTTP proxy to connect to the target URL.
# Syntax: http://address:port # Syntax: http://address:port
proxy = proxy =
@ -129,11 +129,11 @@ retries = 3
# Example: (google|yahoo) # Example: (google|yahoo)
scope = scope =
# Url address to visit frequently during testing. # URL address to visit frequently during testing.
# Example: http://192.168.1.121/index.html # Example: http://192.168.1.121/index.html
safUrl = safUrl =
# Test requests between two visits to a given safe url (default 0). # Test requests between two visits to a given safe URL (default 0).
# Valid: integer # Valid: integer
# Default: 0 # Default: 0
saFreq = 0 saFreq = 0
@ -310,7 +310,7 @@ uChar =
# Valid: string # Valid: string
dnsName = dnsName =
# Resulting page url searched for second-order response # Resulting page URL searched for second-order response
# Valid: string # Valid: string
secondOrder = secondOrder =
@ -582,7 +582,7 @@ charset =
# Valid: True or False # Valid: True or False
checkTor = False checkTor = False
# Crawl the website starting from the target url. # Crawl the website starting from the target URL.
# Valid: integer # Valid: integer
# Default: 0 # Default: 0
crawlDepth = 0 crawlDepth = 0
@ -612,7 +612,7 @@ eta = False
# Valid: True or False # Valid: True or False
flushSession = False flushSession = False
# Parse and test forms on target url. # Parse and test forms on target URL.
# Valid: True or False # Valid: True or False
forms = False forms = False