mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2026-01-24 23:29:05 +00:00
Minor grammar fix
This commit is contained in:
@@ -932,7 +932,7 @@ def checkSuhosinPatch(injection):
|
||||
|
||||
if injection.place == PLACE.GET:
|
||||
debugMsg = "checking for parameter length "
|
||||
debugMsg += "constrainting mechanisms"
|
||||
debugMsg += "constraining mechanisms"
|
||||
logger.debug(debugMsg)
|
||||
|
||||
pushValue(kb.injection)
|
||||
@@ -941,7 +941,7 @@ def checkSuhosinPatch(injection):
|
||||
randInt = randomInt()
|
||||
|
||||
if not checkBooleanExpression("%d=%s%d" % (randInt, ' ' * SUHOSIN_MAX_VALUE_LENGTH, randInt)):
|
||||
warnMsg = "parameter length constrainting "
|
||||
warnMsg = "parameter length constraining "
|
||||
warnMsg += "mechanism detected (e.g. Suhosin patch). "
|
||||
warnMsg += "Potential problems in enumeration phase can be expected"
|
||||
logger.warn(warnMsg)
|
||||
|
||||
@@ -1014,7 +1014,7 @@ def readInput(message, default=None, checkBatch=True, boolean=False):
|
||||
|
||||
dataToStdout("\r%s%s\n" % (message, options), forceOutput=True, bold=True)
|
||||
|
||||
debugMsg = "used the default behaviour, running in batch mode"
|
||||
debugMsg = "used the default behavior, running in batch mode"
|
||||
logger.debug(debugMsg)
|
||||
|
||||
retVal = default
|
||||
@@ -1893,7 +1893,7 @@ def isWindowsDriveLetterPath(filepath):
|
||||
|
||||
def posixToNtSlashes(filepath):
|
||||
"""
|
||||
Replaces all occurances of Posix slashes (/) in provided
|
||||
Replaces all occurrences of Posix slashes (/) in provided
|
||||
filepath with NT ones (\)
|
||||
|
||||
>>> posixToNtSlashes('C:/Windows')
|
||||
@@ -1904,7 +1904,7 @@ def posixToNtSlashes(filepath):
|
||||
|
||||
def ntToPosixSlashes(filepath):
|
||||
"""
|
||||
Replaces all occurances of NT slashes (\) in provided
|
||||
Replaces all occurrences of NT slashes (\) in provided
|
||||
filepath with Posix ones (/)
|
||||
|
||||
>>> ntToPosixSlashes('C:\\Windows')
|
||||
@@ -3764,7 +3764,7 @@ def filterPairValues(values):
|
||||
|
||||
def randomizeParameterValue(value):
|
||||
"""
|
||||
Randomize a parameter value based on occurances of alphanumeric characters
|
||||
Randomize a parameter value based on occurrences of alphanumeric characters
|
||||
|
||||
>>> random.seed(0)
|
||||
>>> randomizeParameterValue('foobar')
|
||||
|
||||
@@ -193,7 +193,7 @@ def stdoutencode(data):
|
||||
warnMsg = "cannot properly display Unicode characters "
|
||||
warnMsg += "inside Windows OS command prompt "
|
||||
warnMsg += "(http://bugs.python.org/issue1602). All "
|
||||
warnMsg += "unhandled occurances will result in "
|
||||
warnMsg += "unhandled occurrences will result in "
|
||||
warnMsg += "replacement with '?' character. Please, find "
|
||||
warnMsg += "proper character representation inside "
|
||||
warnMsg += "corresponding output files. "
|
||||
|
||||
@@ -19,7 +19,7 @@ from lib.core.enums import DBMS_DIRECTORY_NAME
|
||||
from lib.core.enums import OS
|
||||
|
||||
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
|
||||
VERSION = "1.1.12.18"
|
||||
VERSION = "1.1.12.19"
|
||||
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
|
||||
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
|
||||
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)
|
||||
|
||||
@@ -626,7 +626,7 @@ def cmdLineParser(argv=None):
|
||||
|
||||
general.add_option("--batch", dest="batch",
|
||||
action="store_true",
|
||||
help="Never ask for user input, use the default behaviour")
|
||||
help="Never ask for user input, use the default behavior")
|
||||
|
||||
general.add_option("--binary-fields", dest="binaryFields",
|
||||
help="Result fields having binary values (e.g. \"digest\")")
|
||||
|
||||
@@ -501,7 +501,7 @@ class Metasploit:
|
||||
|
||||
send_all(proc, "getsystem\n")
|
||||
|
||||
infoMsg = "displaying the list of Access Tokens availables. "
|
||||
infoMsg = "displaying the list of available Access Tokens. "
|
||||
infoMsg += "Choose which user you want to impersonate by "
|
||||
infoMsg += "using incognito's command 'impersonate_token' if "
|
||||
infoMsg += "'getsystem' does not success to elevate privileges"
|
||||
|
||||
Reference in New Issue
Block a user