You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
According to ChatGPT 4, despite my extensively built 'main.py' and corrected sections that are logic-based on the logic of GPT 3.5 instead of mine. GPT 4 corrected 3.5 by adding:
The "check_sqli_vulnerability, is_sqli_successful, and process_successful_sqli methods are defined but not called anywhere in the code. You might want to use these methods in your SQLi testing methods (test_sqli, test_sqli_error_based, test_sqli_union_based)."
While "the SQLi detection logic in is_sqli_successful method is quite basic, checking if the response text contains "Error" or "SQL syntax". You might want to enhance this based on the specific application you're testing."
Whereas, on my end it pointed out issues such as:
"In the SQLi testing methods, you've used response.elapsed.total_seconds() > 10 to detect a successful SQLi attack. This is specific to time-based SQLi and might not be applicable for error-based and union-based SQLi.
The parse_sitemap method is defined but it's empty and not used. You should implement this method and use it to parse the sitemap and check each URL for SQLi vulnerabilities.
You might also want to handle the case where a domain is found to be vulnerable by multiple SQLi testing methods. In the current code, it will be added to self.vulnerable_domains multiple times.
The current script does not support authentication. If the site requires authentication, the tool will not work properly."
The text was updated successfully, but these errors were encountered:
According to ChatGPT 4, despite my extensively built 'main.py' and corrected sections that are logic-based on the logic of GPT 3.5 instead of mine. GPT 4 corrected 3.5 by adding:
The "check_sqli_vulnerability, is_sqli_successful, and process_successful_sqli methods are defined but not called anywhere in the code. You might want to use these methods in your SQLi testing methods (test_sqli, test_sqli_error_based, test_sqli_union_based)."
While "the SQLi detection logic in is_sqli_successful method is quite basic, checking if the response text contains "Error" or "SQL syntax". You might want to enhance this based on the specific application you're testing."
Whereas, on my end it pointed out issues such as:
"In the SQLi testing methods, you've used response.elapsed.total_seconds() > 10 to detect a successful SQLi attack. This is specific to time-based SQLi and might not be applicable for error-based and union-based SQLi.
The parse_sitemap method is defined but it's empty and not used. You should implement this method and use it to parse the sitemap and check each URL for SQLi vulnerabilities.
You might also want to handle the case where a domain is found to be vulnerable by multiple SQLi testing methods. In the current code, it will be added to self.vulnerable_domains multiple times.
The current script does not support authentication. If the site requires authentication, the tool will not work properly."
The text was updated successfully, but these errors were encountered: