Minor cosmetics

This commit is contained in:
Miroslav Stampar 2013-03-15 17:00:01 +01:00
parent 4010df307e
commit ff4e62ff90
2 changed files with 22 additions and 22 deletions

View File

@ -43,12 +43,12 @@ def cmdLineParser():
# Target options
target = OptionGroup(parser, "Target", "At least one of these "
"options has to be specified to set the source "
"to get target urls from")
"to get target URLs from")
target.add_option("-d", dest="direct", help="Direct "
"connection to the database")
target.add_option("-u", "--url", dest="url", help="Target url")
target.add_option("-u", "--url", dest="url", help="Target URL (e.g. \"www.target.com/vuln.php?id=1\")")
target.add_option("-l", dest="logFile", help="Parse targets from Burp "
"or WebScarab proxy logs")
@ -63,14 +63,14 @@ def cmdLineParser():
help="Load session from a stored (.sqlite) file")
target.add_option("-g", dest="googleDork",
help="Process Google dork results as target urls")
help="Process Google dork results as target URLs")
target.add_option("-c", dest="configFile",
help="Load options from a configuration INI file")
# Request options
request = OptionGroup(parser, "Request", "These options can be used "
"to specify how to connect to the target url")
"to specify how to connect to the target URL")
request.add_option("--data", dest="data",
help="Data string to be sent through POST")
@ -124,7 +124,7 @@ def cmdLineParser():
"key_file,cert_file)")
request.add_option("--proxy", dest="proxy",
help="Use a HTTP proxy to connect to the target url")
help="Use a HTTP proxy to connect to the target URL")
request.add_option("--proxy-cred", dest="pCred",
help="HTTP proxy authentication credentials "
@ -148,10 +148,10 @@ def cmdLineParser():
help="Regexp to filter targets from provided proxy log")
request.add_option("--safe-url", dest="safUrl",
help="Url address to visit frequently during testing")
help="URL address to visit frequently during testing")
request.add_option("--safe-freq", dest="saFreq", type="int",
help="Test requests between two visits to a given safe url")
help="Test requests between two visits to a given safe URL")
request.add_option("--skip-urlencode", dest="skipUrlEncode",
action="store_true",
@ -289,7 +289,7 @@ def cmdLineParser():
help="Domain name used for DNS exfiltration attack")
techniques.add_option("--second-order", dest="secondOrder",
help="Resulting page url searched for second-order "
help="Resulting page URL searched for second-order "
"response")
# Fingerprint options
@ -539,7 +539,7 @@ def cmdLineParser():
help="Check to see if Tor is used properly")
general.add_option("--crawl", dest="crawlDepth", type="int",
help="Crawl the website starting from the target url")
help="Crawl the website starting from the target URL")
general.add_option("--csv-del", dest="csvDel",
help="Delimiting character used in CSV output "
@ -562,7 +562,7 @@ def cmdLineParser():
general.add_option("--forms", dest="forms",
action="store_true",
help="Parse and test forms on target url")
help="Parse and test forms on target URL")
general.add_option("--fresh-queries", dest="freshQueries",
action="store_true",

View File

@ -1,5 +1,5 @@
# At least one of these options has to be specified to set the source to
# get target urls from.
# get target URLs from.
[Target]
# Direct connection to the database.
@ -26,7 +26,7 @@ requestFile =
# Example: output/www.target.com/session.sqlite
sessionFile =
# Rather than providing a target url, let Google return target
# Rather than providing a target URL, let Google return target
# hosts as result of your Google dork expression. For a list of Google
# dorks see Johnny Long Google Hacking Database at
# http://johnny.ihackstuff.com/ghdb.php.
@ -34,7 +34,7 @@ sessionFile =
googleDork =
# These options can be used to specify how to connect to the target url.
# These options can be used to specify how to connect to the target URL.
[Request]
# Data string to be sent through POST.
@ -81,22 +81,22 @@ headers = Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9
Accept-Language: en-us,en;q=0.5
Accept-Charset: ISO-8859-15,utf-8;q=0.7,*;q=0.7
# HTTP Authentication type. Useful only if the target url requires
# HTTP Authentication type. Useful only if the target URL requires
# HTTP Basic, Digest or NTLM authentication and you have such data.
# Valid: Basic, Digest or NTLM
aType =
# HTTP authentication credentials. Useful only if the target url requires
# HTTP authentication credentials. Useful only if the target URL requires
# HTTP Basic, Digest or NTLM authentication and you have such data.
# Syntax: username:password
aCred =
# HTTP Authentication certificate. Useful only if the target url requires
# HTTP Authentication certificate. Useful only if the target URL requires
# logon certificate and you have such data.
# Syntax: key_file,cert_file
aCert =
# Use a HTTP proxy to connect to the target url.
# Use a HTTP proxy to connect to the target URL.
# Syntax: http://address:port
proxy =
@ -129,11 +129,11 @@ retries = 3
# Example: (google|yahoo)
scope =
# Url address to visit frequently during testing.
# URL address to visit frequently during testing.
# Example: http://192.168.1.121/index.html
safUrl =
# Test requests between two visits to a given safe url (default 0).
# Test requests between two visits to a given safe URL (default 0).
# Valid: integer
# Default: 0
saFreq = 0
@ -310,7 +310,7 @@ uChar =
# Valid: string
dnsName =
# Resulting page url searched for second-order response
# Resulting page URL searched for second-order response
# Valid: string
secondOrder =
@ -582,7 +582,7 @@ charset =
# Valid: True or False
checkTor = False
# Crawl the website starting from the target url.
# Crawl the website starting from the target URL.
# Valid: integer
# Default: 0
crawlDepth = 0
@ -612,7 +612,7 @@ eta = False
# Valid: True or False
flushSession = False
# Parse and test forms on target url.
# Parse and test forms on target URL.
# Valid: True or False
forms = False