From 83972d405fe70ff40f562b59f7bf3e51e94d1164 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Fri, 28 Dec 2018 17:54:58 +0100 Subject: [PATCH] Trivial text update --- .github/ISSUE_TEMPLATE.md | 2 +- lib/core/settings.py | 2 +- sqlmap.conf | 6 +++--- tamper/modsecurityversioned.py | 2 +- tamper/modsecurityzeroversioned.py | 2 +- txt/checksum.md5 | 6 +++--- 6 files changed, 10 insertions(+), 10 deletions(-) diff --git a/.github/ISSUE_TEMPLATE.md b/.github/ISSUE_TEMPLATE.md index 062912bd6..cf4ea5111 100644 --- a/.github/ISSUE_TEMPLATE.md +++ b/.github/ISSUE_TEMPLATE.md @@ -19,7 +19,7 @@ * Client OS (e.g. `Microsoft Windows 10`) * Program version (`python sqlmap.py --version` or `sqlmap --version` depending on installation): * Target DBMS (e.g. `Microsoft SQL Server`): -* Detected WAF/IDS/IPS protection (e.g. `ModSecurity` or `unknown`): +* Detected WAF/IPS protection (e.g. `ModSecurity` or `unknown`): * SQLi techniques found by sqlmap (e.g. `error-based` and `boolean-based blind`): * Results of manual target assessment (e.g. found that the payload `query=test' AND 4113 IN ((SELECT 'foobar'))-- qKLV` works): * Relevant console output (if any): diff --git a/lib/core/settings.py b/lib/core/settings.py index 0db323823..4b7d67dc9 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -19,7 +19,7 @@ from lib.core.enums import DBMS_DIRECTORY_NAME from lib.core.enums import OS # sqlmap version (...) -VERSION = "1.2.12.41" +VERSION = "1.2.12.42" TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable" TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34} VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE) diff --git a/sqlmap.conf b/sqlmap.conf index 5dfc3d72d..88bcd002c 100644 --- a/sqlmap.conf +++ b/sqlmap.conf @@ -753,7 +753,7 @@ answers = # Valid: True or False beep = False -# Offline WAF/IPS/IDS payload detection testing. +# Offline WAF/IPS payload detection testing. # Valid: True or False checkPayload = False @@ -774,7 +774,7 @@ disableColoring = False # Default: 1 googlePage = 1 -# Make a thorough testing for a WAF/IPS/IDS protection. +# Make a thorough testing for a WAF/IPS protection. # Valid: True or False identifyWaf = False @@ -790,7 +790,7 @@ mobile = False # Valid: True or False offline = False -# Skip heuristic detection of WAF/IPS/IDS protection. +# Skip heuristic detection of WAF/IPS protection. # Valid: True or False skipWaf = False diff --git a/tamper/modsecurityversioned.py b/tamper/modsecurityversioned.py index 0f8435598..7a6c65697 100644 --- a/tamper/modsecurityversioned.py +++ b/tamper/modsecurityversioned.py @@ -28,7 +28,7 @@ def tamper(payload, **kwargs): * MySQL 5.0 Notes: - * Useful to bypass ModSecurity WAF/IDS + * Useful to bypass ModSecurity WAF >>> import random >>> random.seed(0) diff --git a/tamper/modsecurityzeroversioned.py b/tamper/modsecurityzeroversioned.py index cb54fc8ff..f87b8a098 100644 --- a/tamper/modsecurityzeroversioned.py +++ b/tamper/modsecurityzeroversioned.py @@ -27,7 +27,7 @@ def tamper(payload, **kwargs): * MySQL 5.0 Notes: - * Useful to bypass ModSecurity WAF/IDS + * Useful to bypass ModSecurity WAF >>> tamper('1 AND 2>1--') '1 /*!00000AND 2>1*/--' diff --git a/txt/checksum.md5 b/txt/checksum.md5 index 050d29f93..8540c7d5a 100644 --- a/txt/checksum.md5 +++ b/txt/checksum.md5 @@ -49,7 +49,7 @@ c8c386d644d57c659d74542f5f57f632 lib/core/patch.py 0c3eef46bdbf87e29a3f95f90240d192 lib/core/replication.py a7db43859b61569b601b97f187dd31c5 lib/core/revision.py fcb74fcc9577523524659ec49e2e964b lib/core/session.py -eb8b62b1dc94be51a6c3d44d47af8f4a lib/core/settings.py +6781c2fdbfdac0ec5388ca9f06b89b64 lib/core/settings.py a971ce157d04de96ba6e710d3d38a9a8 lib/core/shell.py a7edc9250d13af36ac0108f259859c19 lib/core/subprocessng.py 1581be48127a3a7a9fd703359b6e7567 lib/core/target.py @@ -262,8 +262,8 @@ ef0639557a79e57b06296c4bc223ebef tamper/htmlencode.py 2dc49bcd6c55f4e2322b07fa92685356 tamper/least.py 40d1ea0796fd91cb3cdd602e36daed15 tamper/lowercase.py a54b361da0ac6988d0b97bc79463615d tamper/luanginx.py -1c4d622d1c2c77fc3db1f8b3849467ee tamper/modsecurityversioned.py -f177a624c2cd3431c433769c6eb995e7 tamper/modsecurityzeroversioned.py +82b85a9325ffc22a9fe4003e12c5bc4a tamper/modsecurityversioned.py +0e0f17db797e61f778141a804ab6cd0d tamper/modsecurityzeroversioned.py 91b63afdb96b1d51c12a14cbd425d310 tamper/multiplespaces.py dcf3458f9010ca41bc4b56804f15792c tamper/overlongutf8more.py a3a3cef042b864c4226b63f89548f939 tamper/overlongutf8.py