Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 6d942f9

Browse files
committed
Removing --check-payload (PHPIDS doesn't update rules lately; also, WAF/IDS/IPS is more than just regexes (unencoding, removing junk, etc.))
1 parent 68e507e commit 6d942f9

6 files changed

Lines changed: 1 addition & 66 deletions

File tree

lib/core/common.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -974,7 +974,6 @@ def setPaths():
974974
paths.SMALL_DICT = os.path.join(paths.SQLMAP_TXT_PATH, "smalldict.txt")
975975
paths.USER_AGENTS = os.path.join(paths.SQLMAP_TXT_PATH, "user-agents.txt")
976976
paths.WORDLIST = os.path.join(paths.SQLMAP_TXT_PATH, "wordlist.zip")
977-
paths.PHPIDS_RULES_XML = os.path.join(paths.SQLMAP_XML_PATH, "phpids_rules.xml")
978977
paths.ERRORS_XML = os.path.join(paths.SQLMAP_XML_PATH, "errors.xml")
979978
paths.PAYLOADS_XML = os.path.join(paths.SQLMAP_XML_PATH, "payloads.xml")
980979
paths.INJECTIONS_XML = os.path.join(paths.SQLMAP_XML_PATH, "injections.xml")

lib/core/dicts.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -205,6 +205,7 @@
205205
DEPRECATED_OPTIONS = {
206206
"--replicate": "use '--dump-format=SQLITE' instead",
207207
"--no-unescape": "use '--no-escape' instead",
208+
"--check-payload": None,
208209
}
209210

210211
DUMP_DATA_PREPROCESS = {

lib/core/optiondict.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,6 @@
195195
"alert": "string",
196196
"answers": "string",
197197
"beep": "boolean",
198-
"checkPayload": "boolean",
199198
"checkWaf": "boolean",
200199
"cleanup": "boolean",
201200
"dependencies": "boolean",

lib/parse/cmdline.py

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -612,10 +612,6 @@ def cmdLineParser():
612612
miscellaneous.add_option("--beep", dest="beep", action="store_true",
613613
help="Make a beep sound when SQL injection is found")
614614

615-
miscellaneous.add_option("--check-payload", dest="checkPayload",
616-
action="store_true",
617-
help="Offline WAF/IPS/IDS payload detection testing")
618-
619615
miscellaneous.add_option("--check-waf", dest="checkWaf",
620616
action="store_true",
621617
help="Check for existence of WAF/IPS/IDS protection")

lib/request/connect.py

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,6 @@
7979
from lib.request.direct import direct
8080
from lib.request.comparison import comparison
8181
from lib.request.methodrequest import MethodRequest
82-
from lib.utils.checkpayload import checkPayload
8382
from thirdparty.socks.socks import ProxyError
8483
from thirdparty.multipart import multipartpost
8584

@@ -658,9 +657,6 @@ def queryPage(value=None, place=None, content=False, getRatioValue=False, silent
658657
if place:
659658
value = agent.removePayloadDelimiters(value)
660659

661-
if conf.checkPayload:
662-
checkPayload(value)
663-
664660
if PLACE.GET in conf.parameters:
665661
get = conf.parameters[PLACE.GET] if place != PLACE.GET or not value else value
666662

lib/utils/checkpayload.py

Lines changed: 0 additions & 56 deletions
This file was deleted.

0 commit comments

Comments
 (0)