Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit a654a42

Browse files
committed
Minor adjustments
1 parent 156fdd9 commit a654a42

5 files changed

Lines changed: 15 additions & 13 deletions

File tree

lib/core/common.py

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@
4848
from lib.core.exception import sqlmapFilePathException
4949
from lib.core.exception import sqlmapNoneDataException
5050
from lib.core.exception import sqlmapSyntaxException
51+
from lib.core.settings import DESCRIPTION
5152
from lib.core.settings import IS_WIN
5253
from lib.core.settings import SITE
5354
from lib.core.settings import SQL_STATEMENTS
@@ -515,9 +516,9 @@ def banner():
515516
"""
516517

517518
print """
519+
%s - %s
518520
%s
519-
%s
520-
""" % (VERSION_STRING, SITE)
521+
""" % (VERSION_STRING, DESCRIPTION, SITE)
521522

522523
def parsePasswordHash(password):
523524
blank = " " * 8

lib/core/optiondict.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,12 +46,12 @@
4646
"aCred": "string",
4747
"aCert": "string",
4848
"proxy": "string",
49+
"ignoreProxy": "boolean",
4950
"threads": "integer",
5051
"delay": "float",
5152
"timeout": "float",
5253
"retries": "integer",
53-
"scope": "string",
54-
"ignoreProxy": "boolean"
54+
"scope": "string"
5555
},
5656

5757
"Injection": {

lib/core/settings.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,8 @@
2828

2929
# sqlmap version and site
3030
VERSION = "0.8-rc7"
31-
VERSION_STRING = "sqlmap/%s - automatic SQL injection and database takeover tool" % VERSION
31+
VERSION_STRING = "sqlmap/%s" % VERSION
32+
DESCRIPTION = "automatic SQL injection and database takeover tool"
3233
SITE = "http://sqlmap.sourceforge.net"
3334

3435
# sqlmap logger

lib/parse/cmdline.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,10 @@ def cmdLineParser():
111111
request.add_option("--proxy", dest="proxy",
112112
help="Use a HTTP proxy to connect to the target url")
113113

114+
request.add_option("--ignore-proxy", dest="ignoreProxy",
115+
action="store_true",
116+
help="Ignore system default HTTP proxy")
117+
114118
request.add_option("--threads", dest="threads", type="int", default=1,
115119
help="Maximum number of concurrent HTTP "
116120
"requests (default 1)")
@@ -129,10 +133,6 @@ def cmdLineParser():
129133
request.add_option("--scope", dest="scope",
130134
help="Regexp to filter targets from provided proxy log")
131135

132-
request.add_option("--ignore-proxy", dest="ignoreProxy",
133-
action="store_true",
134-
help="Ignore system default HTTP proxy")
135-
136136
# Injection options
137137
injection = OptionGroup(parser, "Injection", "These options can be "
138138
"used to specify which parameters to test "

sqlmap.conf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,10 @@ aCert =
8181
# Syntax: http://address:port
8282
proxy =
8383

84+
# Ignore system default HTTP proxy
85+
# Valid: True or False
86+
ignoreProxy = False
87+
8488
# Maximum number of concurrent HTTP requests (handled with Python threads)
8589
# to be used in the inference SQL injection attack.
8690
# Valid: integer
@@ -107,10 +111,6 @@ retries = 3
107111
# Example: (google|yahoo)
108112
scope =
109113

110-
# Ignore system default HTTP proxy
111-
# Valid: True or False
112-
ignoreProxy = False
113-
114114
[Injection]
115115

116116
# Testable parameter(s) comma separated. By default all GET/POST/Cookie

0 commit comments

Comments
 (0)