mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-12-09 06:01:29 +00:00
update
This commit is contained in:
@@ -387,7 +387,7 @@ def checkSqlInjection(place, parameter, value):
|
||||
elif detailKey == "os" and injection.os is None:
|
||||
injection.os = detailValue
|
||||
|
||||
if conf.beep or conf.scriptKiddie:
|
||||
if conf.beep or conf.realTest:
|
||||
beep()
|
||||
|
||||
# There is no need to perform this test for other
|
||||
@@ -589,7 +589,7 @@ def checkStability():
|
||||
logger.warn(warnMsg)
|
||||
|
||||
message = "how do you want to proceed? [C(ontinue)/s(tring)/r(egex)/q(uit)] "
|
||||
if not conf.scriptKiddie:
|
||||
if not conf.realTest:
|
||||
test = readInput(message, default="C")
|
||||
else:
|
||||
test = None
|
||||
|
||||
@@ -227,7 +227,7 @@ def start():
|
||||
elif test[0] in ("q", "Q"):
|
||||
break
|
||||
|
||||
elif conf.scriptKiddie:
|
||||
elif conf.realTest:
|
||||
logger.info(message)
|
||||
else:
|
||||
message += "\ndo you want to test this url? [Y/n/q]"
|
||||
@@ -343,7 +343,7 @@ def start():
|
||||
|
||||
if testSqlInj:
|
||||
check = heuristicCheckSqlInjection(place, parameter, value)
|
||||
if not check and conf.scriptKiddie:
|
||||
if not check and conf.realTest:
|
||||
continue
|
||||
|
||||
logMsg = "testing sql injection on %s " % place
|
||||
@@ -376,7 +376,7 @@ def start():
|
||||
logger.warn(warnMsg)
|
||||
|
||||
if len(kb.injections) == 0 or (len(kb.injections) == 1 and kb.injections[0].place is None):
|
||||
if not conf.scriptKiddie:
|
||||
if not conf.realTest:
|
||||
errMsg = "all parameters are not injectable, try "
|
||||
errMsg += "a higher --level"
|
||||
raise sqlmapNotVulnerableException, errMsg
|
||||
|
||||
Reference in New Issue
Block a user