mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-12-06 04:31:30 +00:00
los cosmeticados
This commit is contained in:
10
sqlmap.conf
10
sqlmap.conf
@@ -218,13 +218,13 @@ string =
|
||||
# (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
|
||||
regexp =
|
||||
|
||||
# Compare pages based only on their textual content
|
||||
# Compare pages based only on the textual content
|
||||
# Valid: True or False
|
||||
textOnly = False
|
||||
|
||||
|
||||
# These options can be used to tweak how specific SQL injection
|
||||
# techniques are tested.
|
||||
# These options can be used to tweak testing of specific SQL injection
|
||||
# techniques.
|
||||
[Techniques]
|
||||
|
||||
# Seconds to delay the response from the DBMS.
|
||||
@@ -237,7 +237,7 @@ timeSec = 5
|
||||
# Example: 1-10
|
||||
uCols =
|
||||
|
||||
# Character to use to bruteforce number of columns
|
||||
# Character to use for bruteforcing number of columns
|
||||
# Valid: string
|
||||
# Example: NULL
|
||||
uChar =
|
||||
@@ -507,7 +507,7 @@ batch = False
|
||||
# Alert with audio beep when sql injection found.
|
||||
beep = False
|
||||
|
||||
# IDS detection testing of injection payload.
|
||||
# IDS detection testing of injection payloads.
|
||||
checkPayload = False
|
||||
|
||||
# Clean up the DBMS by sqlmap specific UDF and tables
|
||||
|
||||
Reference in New Issue
Block a user