Skip to content

Commit b1d8242

Browse files
committed
changing conf.dnsDomain to conf.dName just because of long text problems in help listing
1 parent d2bbfa4 commit b1d8242

7 files changed

Lines changed: 9 additions & 9 deletions

File tree

lib/core/option.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1721,7 +1721,7 @@ def __setTrafficOutputFP():
17211721
conf.trafficFP = openFile(conf.trafficFile, "w+")
17221722

17231723
def __setDNSServer():
1724-
if not conf.dnsDomain:
1724+
if not conf.dName:
17251725
return
17261726

17271727
infoMsg = "setting up DNS server instance"

lib/core/optiondict.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@
8787
"timeSec": "integer",
8888
"uCols": "string",
8989
"uChar": "string",
90-
"dnsDomain": "string"
90+
"dName": "string"
9191
},
9292

9393
"Fingerprint": {

lib/parse/cmdline.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ def cmdLineParser():
272272
techniques.add_option("--union-char", dest="uChar",
273273
help="Character to use for bruteforcing number of columns")
274274

275-
techniques.add_option("--dns-domain", dest="dnsDomain",
275+
techniques.add_option("--dns-domain", dest="dName",
276276
help="Domain name used for DNS exfiltration attack")
277277

278278
# Fingerprint options

lib/request/inject.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ def __goInference(payload, expression, charsetType=None, firstChar=None, lastCha
8484
def __goDns(payload, expression):
8585
value = None
8686

87-
if conf.dnsDomain and kb.dnsTest is not False:
87+
if conf.dName and kb.dnsTest is not False:
8888
if kb.dnsTest is None:
8989
dnsTest(payload)
9090

lib/techniques/dns/test.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ def dnsTest(payload):
2626
errMsg = "data retrieval through DNS channel failed. Turning off DNS exfiltration support"
2727
logger.error(errMsg)
2828

29-
conf.dnsDomain = None
29+
conf.dName = None
3030
else:
3131
infoMsg = "data retrieval through DNS channel was successful"
3232
logger.info(infoMsg)

lib/techniques/dns/use.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ def dnsUse(payload, expression):
4848
count = 0
4949
offset = 1
5050

51-
if conf.dnsDomain and Backend.getIdentifiedDbms() in (DBMS.MSSQL, DBMS.ORACLE, DBMS.MYSQL, DBMS.PGSQL):
51+
if conf.dName and Backend.getIdentifiedDbms() in (DBMS.MSSQL, DBMS.ORACLE, DBMS.MYSQL, DBMS.PGSQL):
5252
output = hashDBRetrieve(expression, checkConf=True)
5353

5454
if output and PARTIAL_VALUE_MARKER in output or kb.dnsTest is None:
@@ -67,7 +67,7 @@ def dnsUse(payload, expression):
6767
nulledCastedField = agent.hexConvertField(nulledCastedField)
6868
expressionReplaced = expression.replace(fieldToCastStr, nulledCastedField, 1)
6969

70-
expressionRequest = getSPQLSnippet(Backend.getIdentifiedDbms(), "dns_request", PREFIX=prefix, QUERY=expressionReplaced, SUFFIX=suffix, DOMAIN=conf.dnsDomain)
70+
expressionRequest = getSPQLSnippet(Backend.getIdentifiedDbms(), "dns_request", PREFIX=prefix, QUERY=expressionReplaced, SUFFIX=suffix, DOMAIN=conf.dName)
7171
expressionUnescaped = unescaper.unescape(expressionRequest)
7272

7373
if Backend.getIdentifiedDbms() in (DBMS.MSSQL, DBMS.PGSQL):
@@ -108,7 +108,7 @@ def dnsUse(payload, expression):
108108
debugMsg = "performed %d queries in %d seconds" % (count, calculateDeltaSeconds(start))
109109
logger.debug(debugMsg)
110110

111-
elif conf.dnsDomain:
111+
elif conf.dName:
112112
warnMsg = "DNS data exfiltration method through SQL injection "
113113
warnMsg += "is currently not available for DBMS %s" % Backend.getIdentifiedDbms()
114114
singleTimeWarnMessage(warnMsg)

sqlmap.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -299,7 +299,7 @@ uChar =
299299

300300
# Domain name used for DNS exfiltration attack
301301
# Valid: string
302-
dnsDomain =
302+
dName =
303303

304304

305305
[Fingerprint]

0 commit comments

Comments
 (0)