Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 302d782

Browse files
committed
minor style update
1 parent 452ef20 commit 302d782

6 files changed

Lines changed: 8 additions & 8 deletions

File tree

lib/controller/checks.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ def checkSqlInjection(place, parameter, value):
7272
# Localized thread data needed for some methods
7373
threadData = getCurrentThreadData()
7474

75-
# Set the flag for sql injection test mode
75+
# Set the flag for SQL injection test mode
7676
kb.testMode = True
7777

7878
for test in getSortedInjectionTests():
@@ -647,7 +647,7 @@ def heuristicCheckSqlInjection(place, parameter):
647647
def simpletonCheckSqlInjection(place, parameter, value):
648648
"""
649649
This is a function for the quickest and simplest
650-
sql injection check (e.g. AND 1=1) - only works
650+
SQL injection check (e.g. AND 1=1) - only works
651651
with integer parameters
652652
"""
653653

lib/controller/controller.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -465,7 +465,7 @@ def start():
465465
logger.info(infoMsg)
466466
continue
467467

468-
infoMsg = "testing sql injection on %s " % place
468+
infoMsg = "testing for SQL injection on %s " % place
469469
infoMsg += "parameter '%s'" % parameter
470470
logger.info(infoMsg)
471471

lib/core/common.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -544,7 +544,7 @@ def paramToDict(place, parameters=None):
544544
or re.search(r'\A9{3,}', testableParameters[parameter]) or re.search(DUMMY_USER_INJECTION, testableParameters[parameter]):
545545
warnMsg = "it appears that you have provided tainted parameter values "
546546
warnMsg += "('%s') with most probably leftover " % element
547-
warnMsg += "chars from manual sql injection "
547+
warnMsg += "chars from manual SQL injection "
548548
warnMsg += "tests (%s) or non-valid numerical value. " % DUMMY_SQL_INJECTION_CHARS
549549
warnMsg += "Please, always use only valid parameter values "
550550
warnMsg += "so sqlmap could be able to properly run "
@@ -1966,7 +1966,7 @@ def wasLastRequestDelayed():
19661966
Returns True if the last web request resulted in a time-delay
19671967
"""
19681968

1969-
# 99.9999999997440% of all non time-based sql injection affected
1969+
# 99.9999999997440% of all non time-based SQL injection affected
19701970
# response times should be inside +-7*stdev([normal response times])
19711971
# Math reference: http://www.answers.com/topic/standard-deviation
19721972

lib/core/target.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -251,7 +251,7 @@ def __setOutputResume():
251251
if not conf.sessionFile:
252252
conf.sessionFile = "%s%ssession" % (conf.outputPath, os.sep)
253253

254-
logger.info("using '%s' as session file" % conf.sessionFile)
254+
logger.info("using '%s' as a session file" % conf.sessionFile)
255255

256256
if os.path.exists(conf.sessionFile):
257257
if not conf.flushSession:

lib/techniques/error/use.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ def __oneShotErrorUse(expression, field):
8383
incrementCounter(PAYLOAD.TECHNIQUE.ERROR)
8484

8585
# Parse the returned page to get the exact error-based
86-
# sql injection output
86+
# SQL injection output
8787
output = reduce(lambda x, y: x if x is not None else y, [ \
8888
extractRegexResult(check, page, re.DOTALL | re.IGNORECASE), \
8989
extractRegexResult(check, listToStrValue(headers.headers \

lib/techniques/union/use.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ def __oneShotUnionUse(expression, unpack=True, limited=False):
7676
incrementCounter(PAYLOAD.TECHNIQUE.UNION)
7777

7878
# Parse the returned page to get the exact union-based
79-
# sql injection output
79+
# SQL injection output
8080
retVal = reduce(lambda x, y: x if x is not None else y, ( \
8181
extractRegexResult(check, removeReflectiveValues(page, payload), re.DOTALL | re.IGNORECASE), \
8282
extractRegexResult(check, removeReflectiveValues(listToStrValue(headers.headers \

0 commit comments

Comments
 (0)