From 1c6ee1dc36849afed6dc42c1b12f6b45183833a1 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Wed, 8 Jun 2011 16:22:16 +0000 Subject: [PATCH] Rephrase --- lib/techniques/inband/union/test.py | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/lib/techniques/inband/union/test.py b/lib/techniques/inband/union/test.py index 40f1a36bc..7f7118b3d 100644 --- a/lib/techniques/inband/union/test.py +++ b/lib/techniques/inband/union/test.py @@ -211,9 +211,10 @@ def __unionTestByCharBruteforce(comment, place, parameter, value, prefix, suffix validPayload, vector = __unionConfirm(comment, place, parameter, value, prefix, suffix, count) if not all([validPayload, vector]) and not conf.uChar: - warnMsg = "please consider usage of --union-char option " - warnMsg += "(e.g. --union-char=1) and/or try to force " - warnMsg += "back-end DBMS (e.g. --dbms=mysql) to make it work" + warnMsg = "please, consider to provide --union-char switch " + warnMsg += "(e.g. --union-char=1) and/or try to force the " + warnMsg += "back-end DBMS (e.g. --dbms=mysql) if UNION based " + warnMsg += "SQL injection is not detected" singleTimeWarnMessage(warnMsg) return validPayload, vector