|
327 | 327 | EXCLUDE_UNESCAPE = ("WAITFOR DELAY ", " INTO DUMPFILE ", " INTO OUTFILE ", "CREATE ", "BULK ", "EXEC ", "RECONFIGURE ", "DECLARE ", "'%s'" % CHAR_INFERENCE_MARK) |
328 | 328 |
|
329 | 329 | # Mark used for replacement of reflected values |
330 | | -REFLECTED_VALUE_MARKER = '__REFLECTED_VALUE__' |
| 330 | +REFLECTED_VALUE_MARKER = "__REFLECTED_VALUE__" |
| 331 | + |
| 332 | +# Regular expression used for replacing border non-alphanum characters |
| 333 | +REFLECTED_BORDER_REGEX = r"[^\s]+" |
331 | 334 |
|
332 | 335 | # Regular expression used for replacing non-alphanum characters |
333 | | -REFLECTED_REPLACEMENT_REGEX = r'.+' |
| 336 | +REFLECTED_REPLACEMENT_REGEX = r".+?" |
334 | 337 |
|
335 | 338 | # Maximum number of alpha-numerical parts in reflected regex (for speed purposes) |
336 | 339 | REFLECTED_MAX_REGEX_PARTS = 10 |
337 | 340 |
|
338 | 341 | # Chars which can be used as a failsafe values in case of too long URL encoding value |
339 | | -URLENCODE_FAILSAFE_CHARS = '()|,' |
| 342 | +URLENCODE_FAILSAFE_CHARS = "()|," |
340 | 343 |
|
341 | 344 | # Maximum length of urlencoded value after which failsafe procedure takes away |
342 | 345 | URLENCODE_CHAR_LIMIT = 2000 |
343 | 346 |
|
344 | 347 | # Default schema for Microsoft SQL Server DBMS |
345 | | -DEFAULT_MSSQL_SCHEMA = 'dbo' |
| 348 | +DEFAULT_MSSQL_SCHEMA = "dbo" |
346 | 349 |
|
347 | 350 | # Display hash attack info every mod number of items |
348 | 351 | HASH_MOD_ITEM_DISPLAY = 11 |
|
357 | 360 | TURN_OFF_RESUME_INFO_LIMIT = 20 |
358 | 361 |
|
359 | 362 | # Strftime format for results file used in multiple target mode |
360 | | -RESULTS_FILE_FORMAT = 'results-%m%d%Y_%I%M%p.csv' |
| 363 | +RESULTS_FILE_FORMAT = "results-%m%d%Y_%I%M%p.csv" |
361 | 364 |
|
362 | 365 | # Official web page with the list of Python supported codecs |
363 | | -CODECS_LIST_PAGE = 'http://docs.python.org/library/codecs.html#standard-encodings' |
| 366 | +CODECS_LIST_PAGE = "http://docs.python.org/library/codecs.html#standard-encodings" |
364 | 367 |
|
365 | 368 | # Simple regular expression used to distinguish scalar from multiple-row commands (not sole condition) |
366 | 369 | SQL_SCALAR_REGEX = r"\A(SELECT(?!\s+DISTINCT\(?))?\s*\w*\(" |
|
390 | 393 | HTML_TITLE_REGEX = "<title>(?P<result>[^<]+)</title>" |
391 | 394 |
|
392 | 395 | # Table used for Base64 conversion in WordPress hash cracking routine |
393 | | -ITOA64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz' |
| 396 | +ITOA64 = "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" |
394 | 397 |
|
395 | 398 | # Chars used to quickly distinguish if the user provided tainted parameter values |
396 | 399 | DUMMY_SQL_INJECTION_CHARS = ";()'" |
397 | 400 |
|
398 | 401 | # Simple check against dummy users |
399 | | -DUMMY_USER_INJECTION = "(?i)[^\w](AND|OR)\s+[^\s]+[=><]" |
| 402 | +DUMMY_USER_INJECTION = r"(?i)[^\w](AND|OR)\s+[^\s]+[=><]" |
400 | 403 |
|
401 | 404 | # Extensions skipped by crawler |
402 | 405 | CRAWL_EXCLUDE_EXTENSIONS = ("gif","jpg","jar","tif","bmp","war","ear","mpg","wmv","mpeg","scm","iso","dmp","dll","cab","so","avi","bin","exe","iso","tar","png","pdf","ps","mp3","zip","rar","gz") |
|
0 commit comments