Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 4e6d1b5

Browse files
committed
added "Detection" part in help listing
1 parent 0d0e2a2 commit 4e6d1b5

2 files changed

Lines changed: 29 additions & 17 deletions

File tree

lib/parse/cmdline.py

Lines changed: 20 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -154,9 +154,7 @@ def cmdLineParser():
154154
injection = OptionGroup(parser, "Injection", "These options can be "
155155
"used to specify which parameters to test "
156156
"for, provide custom injection payloads and "
157-
"how to parse and compare HTTP responses "
158-
"page content when using the blind SQL "
159-
"injection technique.")
157+
"optional tampering scripts.")
160158

161159
injection.add_option("-p", dest="testParameter",
162160
help="Testable parameter(s)")
@@ -174,35 +172,44 @@ def cmdLineParser():
174172
injection.add_option("--postfix", dest="postfix",
175173
help="Injection payload postfix string")
176174

177-
injection.add_option("--string", dest="string",
175+
injection.add_option("--tamper", dest="tamper",
176+
help="Use given script(s) for tampering injection data")
177+
178+
179+
# Detection options
180+
detection = OptionGroup(parser, "Detection", "These options can be "
181+
"used to specify how to parse "
182+
"and compare page content from "
183+
"HTTP responses when using blind SQL "
184+
"injection technique.")
185+
186+
detection.add_option("--string", dest="string",
178187
help="String to match in page when the "
179188
"query is valid")
180189

181-
injection.add_option("--regexp", dest="regexp",
190+
detection.add_option("--regexp", dest="regexp",
182191
help="Regexp to match in page when the "
183192
"query is valid")
184193

185-
injection.add_option("--excl-str", dest="eString",
194+
detection.add_option("--excl-str", dest="eString",
186195
help="String to be excluded before comparing "
187196
"page contents")
188197

189-
injection.add_option("--excl-reg", dest="eRegexp",
198+
detection.add_option("--excl-reg", dest="eRegexp",
190199
help="Matches to be excluded before "
191200
"comparing page contents")
192201

193-
injection.add_option("--threshold", dest="thold", type="float",
202+
detection.add_option("--threshold", dest="thold", type="float",
194203
help="Page comparison threshold value (0.0-1.0)")
195204

196-
injection.add_option("--text-only", dest="textOnly",
205+
detection.add_option("--text-only", dest="textOnly",
197206
action="store_true", default=False,
198207
help="Compare pages based only on their textual content")
199208

200-
injection.add_option("--longest-common", dest="longestCommon",
209+
detection.add_option("--longest-common", dest="longestCommon",
201210
action="store_true", default=False,
202211
help="Compare pages based on their longest common match")
203212

204-
injection.add_option("--tamper", dest="tamper",
205-
help="Use given script(s) for tampering injection data")
206213

207214
# Techniques options
208215
techniques = OptionGroup(parser, "Techniques", "These options can "
@@ -511,6 +518,7 @@ def cmdLineParser():
511518
parser.add_option_group(request)
512519
parser.add_option_group(optimization)
513520
parser.add_option_group(injection)
521+
parser.add_option_group(detection)
514522
parser.add_option_group(techniques)
515523
parser.add_option_group(fingerprint)
516524
parser.add_option_group(enumeration)

sqlmap.conf

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -154,8 +154,7 @@ threads = 1
154154

155155

156156
# These options can be used to specify which parameters to test for,
157-
# provide custom injection payloads and how to parse and compare HTTP
158-
# responses page content when using the blind SQL injection technique.
157+
# provide custom injection payloads and optional tampering scripts.
159158
[Injection]
160159

161160
# Testable parameter(s) comma separated. By default all GET/POST/Cookie
@@ -183,6 +182,14 @@ prefix =
183182
# Injection payload postfix string
184183
postfix =
185184

185+
# Use given script(s) for tampering injection data
186+
tamper =
187+
188+
189+
# These options can be used to specify how to parse and compare page
190+
# content from HTTP responses when using blind SQL injection technique.
191+
[Detection]
192+
186193
# String to match within the page content when the query is valid, only
187194
# needed if the page content dynamically changes at each refresh,
188195
# consequently changing the MD5 hash of the page which is the method used
@@ -221,9 +228,6 @@ textOnly = False
221228
# Valid: True or False
222229
longestCommon = False
223230

224-
# Use given script(s) for tampering injection data
225-
tamper =
226-
227231

228232
# These options can be used to test for specific SQL injection technique
229233
# or to use one of them to exploit the affected parameter(s) rather than

0 commit comments

Comments
 (0)