Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 9f6e04b

Browse files
committed
Minor update of help text
1 parent 1f2bdf5 commit 9f6e04b

4 files changed

Lines changed: 15 additions & 15 deletions

File tree

lib/core/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
from lib.core.enums import OS
2020

2121
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
22-
VERSION = "1.2.10.18"
22+
VERSION = "1.2.10.19"
2323
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
2424
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
2525
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

lib/parse/cmdline.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -99,16 +99,16 @@ def cmdLineParser(argv=None):
9999
help="Force usage of given HTTP method (e.g. PUT)")
100100

101101
request.add_option("--data", dest="data",
102-
help="Data string to be sent through POST")
102+
help="Data string to be sent through POST (e.g. \"id=1\")")
103103

104104
request.add_option("--param-del", dest="paramDel",
105-
help="Character used for splitting parameter values")
105+
help="Character used for splitting parameter values (e.g. &)")
106106

107107
request.add_option("--cookie", dest="cookie",
108-
help="HTTP Cookie header value")
108+
help="HTTP Cookie header value (e.g. \"PHPSESSID=a8d127e..\")")
109109

110110
request.add_option("--cookie-del", dest="cookieDel",
111-
help="Character used for splitting cookie values")
111+
help="Character used for splitting cookie values (e.g. ;)")
112112

113113
request.add_option("--load-cookies", dest="loadCookies",
114114
help="File containing cookies in Netscape/wget format")
@@ -144,7 +144,7 @@ def cmdLineParser(argv=None):
144144
help="HTTP authentication PEM cert/private key file")
145145

146146
request.add_option("--ignore-code", dest="ignoreCode", type="int",
147-
help="Ignore HTTP error code (e.g. 401)")
147+
help="Ignore (problematic) HTTP error code (e.g. 401)")
148148

149149
request.add_option("--ignore-proxy", dest="ignoreProxy", action="store_true",
150150
help="Ignore system default proxy settings")
@@ -617,7 +617,7 @@ def cmdLineParser(argv=None):
617617
help="Run host OS command(s) when SQL injection is found")
618618

619619
miscellaneous.add_option("--answers", dest="answers",
620-
help="Set question answers (e.g. \"quit=N,follow=N\")")
620+
help="Set predefined answers (e.g. \"quit=N,follow=N\")")
621621

622622
miscellaneous.add_option("--beep", dest="beep", action="store_true",
623623
help="Beep on question and/or when SQL injection is found")

sqlmap.conf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,16 +43,16 @@ sitemapUrl =
4343
# Force usage of given HTTP method (e.g. PUT).
4444
method =
4545

46-
# Data string to be sent through POST.
46+
# Data string to be sent through POST (e.g. "id=1").
4747
data =
4848

49-
# Character used for splitting parameter values.
49+
# Character used for splitting parameter values (e.g. &).
5050
paramDel =
5151

52-
# HTTP Cookie header value.
52+
# HTTP Cookie header value (e.g. "PHPSESSID=a8d127e..").
5353
cookie =
5454

55-
# Character used for splitting cookie values.
55+
# Character used for splitting cookie values (e.g. ;).
5656
cookieDel =
5757

5858
# File containing cookies in Netscape/wget format.
@@ -98,7 +98,7 @@ authCred =
9898
# Syntax: key_file
9999
authFile =
100100

101-
# Ignore HTTP error code (e.g. 401).
101+
# Ignore (problematic) HTTP error code (e.g. 401).
102102
# Valid: integer
103103
ignoreCode =
104104

@@ -746,7 +746,7 @@ updateAll = False
746746
# Run host OS command(s) when SQL injection is found.
747747
alert =
748748

749-
# Set question answers (e.g. "quit=N,follow=N").
749+
# Set predefined answers (e.g. "quit=N,follow=N").
750750
answers =
751751

752752
# Beep on question and/or when SQL injection is found.

txt/checksum.md5

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ c8c386d644d57c659d74542f5f57f632 lib/core/patch.py
4949
0c3eef46bdbf87e29a3f95f90240d192 lib/core/replication.py
5050
a7db43859b61569b601b97f187dd31c5 lib/core/revision.py
5151
fcb74fcc9577523524659ec49e2e964b lib/core/session.py
52-
fb1892f8a3902907dcd6c75f58dd80c1 lib/core/settings.py
52+
e8b8aa7f54d6b6b57b34f933063c128f lib/core/settings.py
5353
dd68a9d02fccb4fa1428b20e15b0db5d lib/core/shell.py
5454
a7edc9250d13af36ac0108f259859c19 lib/core/subprocessng.py
5555
47ad325975ab21fc9f11d90b46d0d143 lib/core/target.py
@@ -60,7 +60,7 @@ b35636650cfe721f5cc47fb91737c061 lib/core/update.py
6060
e772deb63270375e685fa5a7b775c382 lib/core/wordlist.py
6161
1e5532ede194ac9c083891c2f02bca93 lib/__init__.py
6262
7620f1f4b8791e13c7184c06b5421754 lib/parse/banner.py
63-
6458f20d6ebe20fb45a79a09c2874d33 lib/parse/cmdline.py
63+
30d7cbada42154dcbb17f4ca969d812a lib/parse/cmdline.py
6464
fb2e2f05dde98caeac6ccf3e67192177 lib/parse/configfile.py
6565
3794ff139869f5ae8e81cfdbe5714f56 lib/parse/handler.py
6666
6bab53ea9d75bc9bb8169d3e8f3f149f lib/parse/headers.py

0 commit comments

Comments
 (0)