@@ -102,7 +102,7 @@ proxy =
102102# Syntax: username:password
103103pCred =
104104
105- # Ignore system default HTTP proxy
105+ # Ignore system default HTTP proxy.
106106# Valid: True or False
107107ignoreProxy = False
108108
@@ -121,21 +121,21 @@ timeout = 30
121121# Default: 3
122122retries = 3
123123
124- # Regular expression for filtering targets from provided Burp
124+ # Regular expression for filtering targets from provided Burp.
125125# or WebScarab proxy log.
126126# Example: (google|yahoo)
127127scope =
128128
129- # Url address to visit frequently during testing
129+ # Url address to visit frequently during testing.
130130# Example: http://192.168.1.121/index.html
131131safUrl =
132132
133- # Test requests between two visits to a given safe url (default 0)
133+ # Test requests between two visits to a given safe url (default 0).
134134# Valid: integer
135135# Default: 0
136136saFreq = 0
137137
138- # Evaluate provided Python code before the request
138+ # Evaluate provided Python code before the request.
139139# Example: import hashlib;id2=hashlib.md5(id).hexdigest()
140140evalCode =
141141
@@ -188,35 +188,35 @@ dbms =
188188# Valid: linux, windows
189189os =
190190
191- # Injection payload prefix string
191+ # Injection payload prefix string.
192192prefix =
193193
194- # Injection payload suffix string
194+ # Injection payload suffix string.
195195suffix =
196196
197- # Use logic operation(s) instead of negating values
197+ # Use logic operation(s) instead of negating values.
198198# Valid: True or False
199199logicNegative = False
200200
201- # Skip testing for given parameter(s)
201+ # Skip testing for given parameter(s).
202202skip =
203203
204- # Use given script(s) for tampering injection data
204+ # Use given script(s) for tampering injection data.
205205tamper =
206206
207207
208208# These options can be used to specify how to parse and compare page
209209# content from HTTP responses when using blind SQL injection technique.
210210[Detection]
211211
212- # Level of tests to perform
212+ # Level of tests to perform.
213213# The higher the value is, the higher the number of HTTP(s) requests are
214214# as well as the better chances to detect a tricky SQL injection.
215215# Valid: Integer between 1 and 5
216216# Default: 1
217217level = 1
218218
219- # Risk of tests to perform
219+ # Risk of tests to perform.
220220# Note: boolean-based blind SQL injection tests with AND are considered
221221# risk 1, with OR are considered risk 3.
222222# Valid: Integer between 0 and 3
@@ -236,17 +236,17 @@ string =
236236# (http://www.python.org/doc/2.5.2/lib/re-syntax.html)
237237regexp =
238238
239- # HTTP response code to match when the query is valid
239+ # HTTP response code to match when the query is valid.
240240# Valid: Integer
241241# Example: 200 (assuming any False statement returns a different response
242242# code)
243243# code =
244244
245- # Compare pages based only on the textual content
245+ # Compare pages based only on the textual content.
246246# Valid: True or False
247247textOnly = False
248248
249- # Compare pages based only on their titles
249+ # Compare pages based only on their titles.
250250# Valid: True or False
251251titles = False
252252
@@ -497,28 +497,28 @@ tmpPath =
497497# system Windows registry.
498498[Windows]
499499
500- # Read a Windows registry key value
500+ # Read a Windows registry key value.
501501# Valid: True or False
502502regRead = False
503503
504- # Write a Windows registry key value data
504+ # Write a Windows registry key value data.
505505# Valid: True or False
506506regAdd = False
507507
508- # Delete a Windows registry key value
508+ # Delete a Windows registry key value.
509509# Valid: True or False
510510regDel = False
511511
512- # Windows registry key
512+ # Windows registry key.
513513regKey =
514514
515- # Windows registry key value
515+ # Windows registry key value.
516516regVal =
517517
518- # Windows registry key value data
518+ # Windows registry key value data.
519519regData =
520520
521- # Windows registry key value type
521+ # Windows registry key value type.
522522regType =
523523
524524
@@ -538,11 +538,11 @@ batch = False
538538# Force character encoding used for data retrieval.
539539charset =
540540
541- # Check to see if Tor is used properly
541+ # Check to see if Tor is used properly.
542542# Valid: True or False
543543checkTor = False
544544
545- # Crawl the website starting from the target url
545+ # Crawl the website starting from the target url.
546546# Valid: integer
547547# Default: 0
548548crawlDepth = 0
@@ -560,14 +560,18 @@ eta = False
560560# Valid: True or False
561561flushSession = False
562562
563- # Parse and test forms on target url
563+ # Parse and test forms on target url.
564564# Valid: True or False
565565forms = False
566566
567567# Ignores query results stored in session file.
568568# Valid: True or False
569569freshQueries = False
570570
571+ # Uses DBMS hex conversion function(s) for data retrieval.
572+ # Valid: True or False
573+ hexConvert = False
574+
571575# Parse and display DBMS error messages from responses.
572576# Valid: True or False
573577parseErrors = False
@@ -580,7 +584,7 @@ replicate = False
580584# Valid: True or False
581585tor = False
582586
583- # Set Tor proxy port other than default
587+ # Set Tor proxy port other than default.
584588# Valid: integer
585589# torPort =
586590
0 commit comments