This resolves issue #35 by merging the code for the last connection in the SQLiAttack with the one for the regular connections. The overarching if-branch that previously separated the two kinds of connection has been eliminated, so that only when there is a difference between the two, the code differentiates. The attack has been tested and generates the same results as before and most of the code has been reused.
This resolves issue #35 by merging the code for the last connection in the SQLiAttack with the one for the regular connections. The overarching if-branch that previously separated the two kinds of connection has been eliminated, so that only when there is a difference between the two, the code differentiates. The attack has been tested and generates the same results as before and most of the code has been reused.
This resolves issue #35 by merging the code for the last connection in the SQLiAttack with the one for the regular connections. The overarching if-branch that previously separated the two kinds of connection has been eliminated, so that only when there is a difference between the two, the code differentiates. The attack has been tested and generates the same results as before and most of the code has been reused.