updated code quality, minor updates to time/stacked based technique, fixed an issue in exception handling when during data extraction user aborts, bumped version 1.0.8
# in case of very slow internet users we will consider timesec value for testing and it should be >= 10 otherwise with good internet we are good to consider random sleep value
# in case of very slow internet users we will consider timesec value for testing and it should be >= 10 otherwise with good internet we are good to consider random sleep value
940
+
sleep_time = timesec if timesec >= 10 else random.randint(5, 9)
937
941
injection_type = injection_type.upper()
938
942
is_injected = False
939
943
requests_counter = 1
skipped 3 lines
943
947
terminate_on_web_firewall = False
944
948
http_firewall_code_counter = 0
945
949
error_msg = None
950
+
_out = []
946
951
for payloads_delay in payloads_response_delay:
947
952
for entry in payloads_delay:
948
953
backend = entry.dbms
skipped 160 lines
1109
1114
continue
1110
1115
logger.notice(message)
1111
1116
_url = attack.request_url if injection_type == "GET" else attack.url