mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-12-06 12:41:30 +00:00
kids, don't use this at home
This commit is contained in:
@@ -463,6 +463,8 @@ def heuristicCheckSqlInjection(place, parameter, value):
|
||||
infoMsg += "not be injectable"
|
||||
logger.warn(infoMsg)
|
||||
|
||||
return result
|
||||
|
||||
def checkDynParam(place, parameter, value):
|
||||
"""
|
||||
This function checks if the url parameter is dynamic. If it is
|
||||
|
||||
@@ -339,7 +339,9 @@ def start():
|
||||
kb.testedParams.add(paramKey)
|
||||
|
||||
if testSqlInj:
|
||||
heuristicCheckSqlInjection(place, parameter, value)
|
||||
check = heuristicCheckSqlInjection(place, parameter, value)
|
||||
if not check and conf.scriptKiddie:
|
||||
continue
|
||||
|
||||
logMsg = "testing sql injection on %s " % place
|
||||
logMsg += "parameter '%s'" % parameter
|
||||
|
||||
@@ -532,6 +532,9 @@ def cmdLineParser():
|
||||
parser.add_option("--technique", dest="technique", type="int",
|
||||
default=False, help=SUPPRESS_HELP)
|
||||
|
||||
parser.add_option("--script-kiddie", dest="scriptKiddie", action="store_true",
|
||||
default=False, help=SUPPRESS_HELP)
|
||||
|
||||
parser.add_option_group(target)
|
||||
parser.add_option_group(request)
|
||||
parser.add_option_group(optimization)
|
||||
|
||||
Reference in New Issue
Block a user