@@ -154,9 +154,7 @@ def cmdLineParser():
154154 injection = OptionGroup (parser , "Injection" , "These options can be "
155155 "used to specify which parameters to test "
156156 "for, provide custom injection payloads and "
157- "how to parse and compare HTTP responses "
158- "page content when using the blind SQL "
159- "injection technique." )
157+ "optional tampering scripts." )
160158
161159 injection .add_option ("-p" , dest = "testParameter" ,
162160 help = "Testable parameter(s)" )
@@ -174,35 +172,44 @@ def cmdLineParser():
174172 injection .add_option ("--postfix" , dest = "postfix" ,
175173 help = "Injection payload postfix string" )
176174
177- injection .add_option ("--string" , dest = "string" ,
175+ injection .add_option ("--tamper" , dest = "tamper" ,
176+ help = "Use given script(s) for tampering injection data" )
177+
178+
179+ # Detection options
180+ detection = OptionGroup (parser , "Detection" , "These options can be "
181+ "used to specify how to parse "
182+ "and compare page content from "
183+ "HTTP responses when using blind SQL "
184+ "injection technique." )
185+
186+ detection .add_option ("--string" , dest = "string" ,
178187 help = "String to match in page when the "
179188 "query is valid" )
180189
181- injection .add_option ("--regexp" , dest = "regexp" ,
190+ detection .add_option ("--regexp" , dest = "regexp" ,
182191 help = "Regexp to match in page when the "
183192 "query is valid" )
184193
185- injection .add_option ("--excl-str" , dest = "eString" ,
194+ detection .add_option ("--excl-str" , dest = "eString" ,
186195 help = "String to be excluded before comparing "
187196 "page contents" )
188197
189- injection .add_option ("--excl-reg" , dest = "eRegexp" ,
198+ detection .add_option ("--excl-reg" , dest = "eRegexp" ,
190199 help = "Matches to be excluded before "
191200 "comparing page contents" )
192201
193- injection .add_option ("--threshold" , dest = "thold" , type = "float" ,
202+ detection .add_option ("--threshold" , dest = "thold" , type = "float" ,
194203 help = "Page comparison threshold value (0.0-1.0)" )
195204
196- injection .add_option ("--text-only" , dest = "textOnly" ,
205+ detection .add_option ("--text-only" , dest = "textOnly" ,
197206 action = "store_true" , default = False ,
198207 help = "Compare pages based only on their textual content" )
199208
200- injection .add_option ("--longest-common" , dest = "longestCommon" ,
209+ detection .add_option ("--longest-common" , dest = "longestCommon" ,
201210 action = "store_true" , default = False ,
202211 help = "Compare pages based on their longest common match" )
203212
204- injection .add_option ("--tamper" , dest = "tamper" ,
205- help = "Use given script(s) for tampering injection data" )
206213
207214 # Techniques options
208215 techniques = OptionGroup (parser , "Techniques" , "These options can "
@@ -511,6 +518,7 @@ def cmdLineParser():
511518 parser .add_option_group (request )
512519 parser .add_option_group (optimization )
513520 parser .add_option_group (injection )
521+ parser .add_option_group (detection )
514522 parser .add_option_group (techniques )
515523 parser .add_option_group (fingerprint )
516524 parser .add_option_group (enumeration )
0 commit comments