@@ -552,7 +552,7 @@ def genCmpPayload():
552552
553553 kb .previousMethod = method
554554
555- if conf .dummy :
555+ if conf .dummy or conf . offline :
556556 injectable = False
557557
558558 # If the injection test was successful feed the injection
@@ -1142,7 +1142,7 @@ def checkWaf():
11421142 Reference: http://seclists.org/nmap-dev/2011/q2/att-1005/http-waf-detect.nse
11431143 """
11441144
1145- if any ((conf .string , conf .notString , conf .regexp )):
1145+ if any ((conf .string , conf .notString , conf .regexp , conf . dummy , conf . offline )):
11461146 return None
11471147
11481148 dbmMsg = "heuristically checking if the target is protected by "
@@ -1290,7 +1290,7 @@ def checkNullConnection():
12901290 return kb .nullConnection is not None
12911291
12921292def checkConnection (suppressOutput = False ):
1293- if not any ((conf .proxy , conf .tor , conf .dummy )):
1293+ if not any ((conf .proxy , conf .tor , conf .dummy , conf . offline )):
12941294 try :
12951295 debugMsg = "resolving hostname '%s'" % conf .hostname
12961296 logger .debug (debugMsg )
@@ -1303,7 +1303,7 @@ def checkConnection(suppressOutput=False):
13031303 errMsg += "resolving a host name '%s' ('%s')" % (conf .hostname , getUnicode (ex ))
13041304 raise SqlmapConnectionException (errMsg )
13051305
1306- if not suppressOutput and not conf .dummy :
1306+ if not suppressOutput and not conf .dummy and not conf . offline :
13071307 infoMsg = "testing connection to the target URL"
13081308 logger .info (infoMsg )
13091309
0 commit comments