Skip to content

Commit 83972d4

Browse files
committed
Trivial text update
1 parent de0df99 commit 83972d4

File tree

6 files changed

+10
-10
lines changed

6 files changed

+10
-10
lines changed

.github/ISSUE_TEMPLATE.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
* Client OS (e.g. `Microsoft Windows 10`)
2020
* Program version (`python sqlmap.py --version` or `sqlmap --version` depending on installation):
2121
* Target DBMS (e.g. `Microsoft SQL Server`):
22-
* Detected WAF/IDS/IPS protection (e.g. `ModSecurity` or `unknown`):
22+
* Detected WAF/IPS protection (e.g. `ModSecurity` or `unknown`):
2323
* SQLi techniques found by sqlmap (e.g. `error-based` and `boolean-based blind`):
2424
* Results of manual target assessment (e.g. found that the payload `query=test' AND 4113 IN ((SELECT 'foobar'))-- qKLV` works):
2525
* Relevant console output (if any):

lib/core/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
from lib.core.enums import OS
2020

2121
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
22-
VERSION = "1.2.12.41"
22+
VERSION = "1.2.12.42"
2323
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
2424
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
2525
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

sqlmap.conf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -753,7 +753,7 @@ answers =
753753
# Valid: True or False
754754
beep = False
755755

756-
# Offline WAF/IPS/IDS payload detection testing.
756+
# Offline WAF/IPS payload detection testing.
757757
# Valid: True or False
758758
checkPayload = False
759759

@@ -774,7 +774,7 @@ disableColoring = False
774774
# Default: 1
775775
googlePage = 1
776776

777-
# Make a thorough testing for a WAF/IPS/IDS protection.
777+
# Make a thorough testing for a WAF/IPS protection.
778778
# Valid: True or False
779779
identifyWaf = False
780780

@@ -790,7 +790,7 @@ mobile = False
790790
# Valid: True or False
791791
offline = False
792792

793-
# Skip heuristic detection of WAF/IPS/IDS protection.
793+
# Skip heuristic detection of WAF/IPS protection.
794794
# Valid: True or False
795795
skipWaf = False
796796

tamper/modsecurityversioned.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ def tamper(payload, **kwargs):
2828
* MySQL 5.0
2929
3030
Notes:
31-
* Useful to bypass ModSecurity WAF/IDS
31+
* Useful to bypass ModSecurity WAF
3232
3333
>>> import random
3434
>>> random.seed(0)

tamper/modsecurityzeroversioned.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ def tamper(payload, **kwargs):
2727
* MySQL 5.0
2828
2929
Notes:
30-
* Useful to bypass ModSecurity WAF/IDS
30+
* Useful to bypass ModSecurity WAF
3131
3232
>>> tamper('1 AND 2>1--')
3333
'1 /*!00000AND 2>1*/--'

txt/checksum.md5

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ c8c386d644d57c659d74542f5f57f632 lib/core/patch.py
4949
0c3eef46bdbf87e29a3f95f90240d192 lib/core/replication.py
5050
a7db43859b61569b601b97f187dd31c5 lib/core/revision.py
5151
fcb74fcc9577523524659ec49e2e964b lib/core/session.py
52-
eb8b62b1dc94be51a6c3d44d47af8f4a lib/core/settings.py
52+
6781c2fdbfdac0ec5388ca9f06b89b64 lib/core/settings.py
5353
a971ce157d04de96ba6e710d3d38a9a8 lib/core/shell.py
5454
a7edc9250d13af36ac0108f259859c19 lib/core/subprocessng.py
5555
1581be48127a3a7a9fd703359b6e7567 lib/core/target.py
@@ -262,8 +262,8 @@ ef0639557a79e57b06296c4bc223ebef tamper/htmlencode.py
262262
2dc49bcd6c55f4e2322b07fa92685356 tamper/least.py
263263
40d1ea0796fd91cb3cdd602e36daed15 tamper/lowercase.py
264264
a54b361da0ac6988d0b97bc79463615d tamper/luanginx.py
265-
1c4d622d1c2c77fc3db1f8b3849467ee tamper/modsecurityversioned.py
266-
f177a624c2cd3431c433769c6eb995e7 tamper/modsecurityzeroversioned.py
265+
82b85a9325ffc22a9fe4003e12c5bc4a tamper/modsecurityversioned.py
266+
0e0f17db797e61f778141a804ab6cd0d tamper/modsecurityzeroversioned.py
267267
91b63afdb96b1d51c12a14cbd425d310 tamper/multiplespaces.py
268268
dcf3458f9010ca41bc4b56804f15792c tamper/overlongutf8more.py
269269
a3a3cef042b864c4226b63f89548f939 tamper/overlongutf8.py

0 commit comments

Comments
 (0)