Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit e0149e1

Browse files
committed
Minor update
1 parent 98c6d8f commit e0149e1

2 files changed

Lines changed: 50 additions & 50 deletions

File tree

lib/core/settings.py

Lines changed: 48 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
from lib.core.enums import OS
2020

2121
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
22-
VERSION = "1.0.10.51"
22+
VERSION = "1.0.10.52"
2323
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
2424
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
2525
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)
@@ -103,7 +103,7 @@
103103
DISCONNECT_SEARCH_REGEX = r'<p class="url wrapword">([^<]+)</p>'
104104

105105
# Dummy user agent for search (if default one returns different results)
106-
DUMMY_SEARCH_USER_AGENT = "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:40.0) Gecko/20100101 Firefox/40.0"
106+
DUMMY_SEARCH_USER_AGENT = "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:49.0) Gecko/20100101 Firefox/49.0"
107107

108108
# Regular expression used for extracting content from "textual" tags
109109
TEXT_TAG_REGEX = r"(?si)<(abbr|acronym|b|blockquote|br|center|cite|code|dt|em|font|h\d|i|li|p|pre|q|strong|sub|sup|td|th|title|tt|u)(?!\w).*?>(?P<result>[^<]+)"
@@ -251,39 +251,39 @@
251251

252252
# Items displayed in basic help (-h) output
253253
BASIC_HELP_ITEMS = (
254-
"url",
255-
"googleDork",
256-
"data",
257-
"cookie",
258-
"randomAgent",
259-
"proxy",
260-
"testParameter",
261-
"dbms",
262-
"level",
263-
"risk",
264-
"tech",
265-
"getAll",
266-
"getBanner",
267-
"getCurrentUser",
268-
"getCurrentDb",
269-
"getPasswordHashes",
270-
"getTables",
271-
"getColumns",
272-
"getSchema",
273-
"dumpTable",
274-
"dumpAll",
275-
"db",
276-
"tbl",
277-
"col",
278-
"osShell",
279-
"osPwn",
280-
"batch",
281-
"checkTor",
282-
"flushSession",
283-
"tor",
284-
"sqlmapShell",
285-
"wizard",
286-
)
254+
"url",
255+
"googleDork",
256+
"data",
257+
"cookie",
258+
"randomAgent",
259+
"proxy",
260+
"testParameter",
261+
"dbms",
262+
"level",
263+
"risk",
264+
"tech",
265+
"getAll",
266+
"getBanner",
267+
"getCurrentUser",
268+
"getCurrentDb",
269+
"getPasswordHashes",
270+
"getTables",
271+
"getColumns",
272+
"getSchema",
273+
"dumpTable",
274+
"dumpAll",
275+
"db",
276+
"tbl",
277+
"col",
278+
"osShell",
279+
"osPwn",
280+
"batch",
281+
"checkTor",
282+
"flushSession",
283+
"tor",
284+
"sqlmapShell",
285+
"wizard",
286+
)
287287

288288
# String representation for NULL value
289289
NULL = "NULL"
@@ -299,13 +299,13 @@
299299

300300
# Regular expressions used for parsing error messages (--parse-errors)
301301
ERROR_PARSING_REGEXES = (
302-
r"<b>[^<]*(fatal|error|warning|exception)[^<]*</b>:?\s*(?P<result>.+?)<br\s*/?\s*>",
303-
r"(?m)^(fatal|error|warning|exception):?\s*(?P<result>[^\n]+?)$",
304-
r"(?P<result>[^\n>]*SQL Syntax[^\n<]+)",
305-
r"<li>Error Type:<br>(?P<result>.+?)</li>",
306-
r"error '[0-9a-f]{8}'((<[^>]+>)|\s)+(?P<result>[^<>]+)",
307-
r"\[[^\n\]]+(ODBC|JDBC)[^\n\]]+\](\[[^\]]+\])?(?P<result>[^\n]+(in query expression|\(SQL| at /[^ ]+pdo)[^\n<]+)"
308-
)
302+
r"<b>[^<]*(fatal|error|warning|exception)[^<]*</b>:?\s*(?P<result>.+?)<br\s*/?\s*>",
303+
r"(?m)^(fatal|error|warning|exception):?\s*(?P<result>[^\n]+?)$",
304+
r"(?P<result>[^\n>]*SQL Syntax[^\n<]+)",
305+
r"<li>Error Type:<br>(?P<result>.+?)</li>",
306+
r"error '[0-9a-f]{8}'((<[^>]+>)|\s)+(?P<result>[^<>]+)",
307+
r"\[[^\n\]]+(ODBC|JDBC)[^\n\]]+\](\[[^\]]+\])?(?P<result>[^\n]+(in query expression|\(SQL| at /[^ ]+pdo)[^\n<]+)"
308+
)
309309

310310
# Regular expression used for parsing charset info from meta html headers
311311
META_CHARSET_REGEX = r'(?si)<head>.*<meta[^>]+charset="?(?P<result>[^"> ]+).*</head>'
@@ -482,12 +482,12 @@
482482

483483
# Vectors used for provoking specific WAF/IPS/IDS behavior(s)
484484
WAF_ATTACK_VECTORS = (
485-
"", # NIL
486-
"search=<script>alert(1)</script>",
487-
"file=../../../../etc/passwd",
488-
"q=<invalid>foobar",
489-
"id=1 %s" % IDS_WAF_CHECK_PAYLOAD
490-
)
485+
"", # NIL
486+
"search=<script>alert(1)</script>",
487+
"file=../../../../etc/passwd",
488+
"q=<invalid>foobar",
489+
"id=1 %s" % IDS_WAF_CHECK_PAYLOAD
490+
)
491491

492492
# Used for status representation in dictionary attack phase
493493
ROTATING_CHARS = ('\\', '|', '|', '/', '-')

txt/checksum.md5

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ e60456db5380840a586654344003d4e6 lib/core/readlineng.py
4545
5ef56abb8671c2ca6ceecb208258e360 lib/core/replication.py
4646
99a2b496b9d5b546b335653ca801153f lib/core/revision.py
4747
7c15dd2777af4dac2c89cab6df17462e lib/core/session.py
48-
1704cd24d6a18570392afba5e901c136 lib/core/settings.py
48+
e39defdec6e34d32ab82541c88d64880 lib/core/settings.py
4949
7af83e4f18cab6dff5e67840eb65be80 lib/core/shell.py
5050
23657cd7d924e3c6d225719865855827 lib/core/subprocessng.py
5151
c3ace7874a536d801f308cf1fd03df99 lib/core/target.py
@@ -67,7 +67,7 @@ b40a4c5d91770d347df36d3065b63798 lib/parse/sitemap.py
6767
9299f21804033f099681525bb9bf51c0 lib/request/basicauthhandler.py
6868
083e7f446909b12009e72ae8e5e5737c lib/request/basic.py
6969
c48285682a61d49982cb508351013cb4 lib/request/comparison.py
70-
1738ef76fe7c0a7340b609542a40b700 lib/request/connect.py
70+
9bff6fe291805380c6a74d0cda6684a5 lib/request/connect.py
7171
d4d52c1073c75a6eecd2ebb98b670b96 lib/request/direct.py
7272
1a46f7bb26b23ec0c0d9d9c95828241b lib/request/dns.py
7373
70ceefe39980611494d4f99afb96f652 lib/request/httpshandler.py

0 commit comments

Comments
 (0)