@@ -39,7 +39,7 @@ def cmdLineParser():
3939 # Target options
4040 target = OptionGroup (parser , "Target" , "At least one of these "
4141 "options has to be specified to set the source "
42- "to get target urls from. " )
42+ "to get target urls from" )
4343
4444 target .add_option ("-d" , dest = "direct" , help = "Direct "
4545 "connection to the database" )
@@ -63,7 +63,7 @@ def cmdLineParser():
6363
6464 # Request options
6565 request = OptionGroup (parser , "Request" , "These options can be used "
66- "to specify how to connect to the target url. " )
66+ "to specify how to connect to the target url" )
6767
6868 request .add_option ("--data" , dest = "data" ,
6969 help = "Data string to be sent through POST" )
@@ -149,7 +149,7 @@ def cmdLineParser():
149149 # Optimization options
150150 optimization = OptionGroup (parser , "Optimization" , "These "
151151 "options can be used to optimize the "
152- "performance of sqlmap. " )
152+ "performance of sqlmap" )
153153
154154 optimization .add_option ("-o" , dest = "optimize" ,
155155 action = "store_true" ,
@@ -172,7 +172,7 @@ def cmdLineParser():
172172 injection = OptionGroup (parser , "Injection" , "These options can be "
173173 "used to specify which parameters to test "
174174 "for, provide custom injection payloads and "
175- "optional tampering scripts. " )
175+ "optional tampering scripts" )
176176
177177 injection .add_option ("-p" , dest = "testParameter" ,
178178 help = "Testable parameter(s)" )
@@ -205,7 +205,7 @@ def cmdLineParser():
205205 "used to specify how to parse "
206206 "and compare page content from "
207207 "HTTP responses when using blind SQL "
208- "injection technique. " )
208+ "injection technique" )
209209
210210 detection .add_option ("--level" , dest = "level" , type = "int" ,
211211 help = "Level of tests to perform (1-5, "
@@ -237,7 +237,7 @@ def cmdLineParser():
237237 # Techniques options
238238 techniques = OptionGroup (parser , "Techniques" , "These options can be "
239239 "used to tweak testing of specific SQL "
240- "injection techniques. " )
240+ "injection techniques" )
241241
242242 techniques .add_option ("--technique" , dest = "tech" ,
243243 help = "SQL injection techniques to test for "
@@ -266,7 +266,7 @@ def cmdLineParser():
266266 "be used to enumerate the back-end database "
267267 "management system information, structure "
268268 "and data contained in the tables. Moreover "
269- "you can run your own SQL statements. " )
269+ "you can run your own SQL statements" )
270270
271271 enumeration .add_option ("-b" , "--banner" , dest = "getBanner" ,
272272 action = "store_true" , help = "Retrieve DBMS banner" )
@@ -361,7 +361,7 @@ def cmdLineParser():
361361 # User-defined function options
362362 brute = OptionGroup (parser , "Brute force" , "These "
363363 "options can be used to run brute force "
364- "checks. " )
364+ "checks" )
365365
366366 brute .add_option ("--common-tables" , dest = "commonTables" , action = "store_true" ,
367367 help = "Check existence of common tables" )
@@ -372,7 +372,7 @@ def cmdLineParser():
372372 # User-defined function options
373373 udf = OptionGroup (parser , "User-defined function injection" , "These "
374374 "options can be used to create custom user-defined "
375- "functions. " )
375+ "functions" )
376376
377377 udf .add_option ("--udf-inject" , dest = "udfInject" , action = "store_true" ,
378378 help = "Inject custom user-defined functions" )
@@ -383,7 +383,7 @@ def cmdLineParser():
383383 # File system options
384384 filesystem = OptionGroup (parser , "File system access" , "These options "
385385 "can be used to access the back-end database "
386- "management system underlying file system. " )
386+ "management system underlying file system" )
387387
388388 filesystem .add_option ("--file-read" , dest = "rFile" ,
389389 help = "Read a file from the back-end DBMS "
@@ -401,7 +401,7 @@ def cmdLineParser():
401401 takeover = OptionGroup (parser , "Operating system access" , "These "
402402 "options can be used to access the back-end "
403403 "database management system underlying "
404- "operating system. " )
404+ "operating system" )
405405
406406 takeover .add_option ("--os-cmd" , dest = "osCmd" ,
407407 help = "Execute an operating system command" )
@@ -442,7 +442,7 @@ def cmdLineParser():
442442 windows = OptionGroup (parser , "Windows registry access" , "These "
443443 "options can be used to access the back-end "
444444 "database management system Windows "
445- "registry. " )
445+ "registry" )
446446
447447 windows .add_option ("--reg-read" , dest = "regRead" ,
448448 action = "store_true" ,
@@ -470,7 +470,7 @@ def cmdLineParser():
470470
471471 # General options
472472 general = OptionGroup (parser , "General" , "These options can be used "
473- "to set some general working parameters. " )
473+ "to set some general working parameters" )
474474
475475 #general.add_option("-x", dest="xmlFile",
476476 # help="Dump the data into an XML file")
@@ -648,7 +648,7 @@ def cmdLineParser():
648648
649649 if not any ((args .direct , args .url , args .logFile , args .bulkFile , args .googleDork , args .configFile , \
650650 args .requestFile , args .updateAll , args .smokeTest , args .liveTest , args .realTest , args .wizard , args .dependencies )):
651- errMsg = "missing a mandatory parameter (-d, -u, -l, -m, -r, -g, -c, --wizard, --update or --dependencies), "
651+ errMsg = "missing a mandatory option (-d, -u, -l, -m, -r, -g, -c, --wizard, --update or --dependencies), "
652652 errMsg += "-h for help"
653653 parser .error (errMsg )
654654
0 commit comments