mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 17:46:37 +03:00
Added support for reflective meterpreter by default when the target OS
is Windows and minor layout fix
This commit is contained in:
parent
ba2e009fd9
commit
0fc4587f02
|
@ -80,9 +80,11 @@ class Metasploit:
|
||||||
|
|
||||||
self.__msfPayloadsList = {
|
self.__msfPayloadsList = {
|
||||||
"windows": {
|
"windows": {
|
||||||
1: ( "Meterpreter (default)", "windows/meterpreter" ),
|
1: ( "Reflective Meterpreter (default)", "windows/reflectivemeterpreter" ),
|
||||||
2: ( "Shell", "windows/shell" ),
|
2: ( "Meterpreter", "windows/meterpreter" ),
|
||||||
3: ( "VNC", "windows/vncinject" ),
|
3: ( "Shell", "windows/shell" ),
|
||||||
|
4: ( "Reflective VNC", "windows/reflectivevncinject" ),
|
||||||
|
5: ( "VNC", "windows/vncinject" ),
|
||||||
},
|
},
|
||||||
"linux": {
|
"linux": {
|
||||||
1: ( "Shell", "linux/x86/shell" ),
|
1: ( "Shell", "linux/x86/shell" ),
|
||||||
|
@ -196,7 +198,7 @@ class Metasploit:
|
||||||
infoMsg += "'incognito' extension to privilege escalate"
|
infoMsg += "'incognito' extension to privilege escalate"
|
||||||
logger.info(infoMsg)
|
logger.info(infoMsg)
|
||||||
|
|
||||||
__payloadStr = "windows/meterpreter"
|
__payloadStr = "windows/reflectivemeterpreter"
|
||||||
|
|
||||||
else:
|
else:
|
||||||
__payloadStr = self.__skeletonSelection("payload", self.__msfPayloadsList)
|
__payloadStr = self.__skeletonSelection("payload", self.__msfPayloadsList)
|
||||||
|
@ -230,14 +232,14 @@ class Metasploit:
|
||||||
if choose == True:
|
if choose == True:
|
||||||
message = "what do you want to do?\n"
|
message = "what do you want to do?\n"
|
||||||
message += "[1] Give it a try anyway\n"
|
message += "[1] Give it a try anyway\n"
|
||||||
message += "[2] Fall back to Meterpreter payload (default)\n"
|
message += "[2] Fall back to reflective Meterpreter payload (default)\n"
|
||||||
message += "[3] Fall back to Shell payload"
|
message += "[3] Fall back to Shell payload"
|
||||||
|
|
||||||
while True:
|
while True:
|
||||||
choice = readInput(message, default="2")
|
choice = readInput(message, default="2")
|
||||||
|
|
||||||
if not choice or choice == "2":
|
if not choice or choice == "2":
|
||||||
__payloadStr = "windows/meterpreter"
|
__payloadStr = "windows/reflectivemeterpreter"
|
||||||
|
|
||||||
break
|
break
|
||||||
|
|
||||||
|
@ -622,7 +624,7 @@ class Metasploit:
|
||||||
packedSize = upx.pack(self.exeFilePathLocal)
|
packedSize = upx.pack(self.exeFilePathLocal)
|
||||||
debugMsg = "the encoded payload size is %s bytes, " % payloadSize
|
debugMsg = "the encoded payload size is %s bytes, " % payloadSize
|
||||||
|
|
||||||
if packedSize:
|
if packedSize and packedSize != exeSize:
|
||||||
debugMsg += "as a compressed portable executable its size "
|
debugMsg += "as a compressed portable executable its size "
|
||||||
debugMsg += "is %d bytes, decompressed it " % packedSize
|
debugMsg += "is %d bytes, decompressed it " % packedSize
|
||||||
debugMsg += "was %s bytes large" % exeSize
|
debugMsg += "was %s bytes large" % exeSize
|
||||||
|
|
Loading…
Reference in New Issue
Block a user