mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-02-21 14:02:49 +03:00
Adapted sqlmap to latest changes in Metasploit trunk
This commit is contained in:
parent
aa14bea051
commit
1bf6a7cadc
|
@ -306,13 +306,12 @@ class Takeover(Abstraction, Metasploit, Registry):
|
||||||
self.getRemoteTempPath()
|
self.getRemoteTempPath()
|
||||||
|
|
||||||
goUdf = False
|
goUdf = False
|
||||||
condition = ( kb.dbms == "MySQL" or kb.dbms == "PostgreSQL" )
|
|
||||||
|
|
||||||
if condition is True:
|
if kb.dbms == "MySQL":
|
||||||
msg = "how do you want to execute the Metasploit shellcode "
|
msg = "how do you want to execute the Metasploit shellcode "
|
||||||
msg += "on the back-end database underlying operating system?"
|
msg += "on the back-end database underlying operating system?"
|
||||||
msg += "\n[1] Stand-alone payload stager (file system way, default)"
|
msg += "\n[1] Via UDF 'sys_bineval' (in-memory way, anti-forensics, default)"
|
||||||
msg += "\n[2] Via UDF 'sys_bineval' (in-memory way, anti-forensics)"
|
msg += "\n[2] Stand-alone payload stager (file system way)"
|
||||||
|
|
||||||
while True:
|
while True:
|
||||||
choice = readInput(msg, default=1)
|
choice = readInput(msg, default=1)
|
||||||
|
@ -328,7 +327,10 @@ class Takeover(Abstraction, Metasploit, Registry):
|
||||||
warnMsg = "invalid value, valid values are 1 and 2"
|
warnMsg = "invalid value, valid values are 1 and 2"
|
||||||
logger.warn(warnMsg)
|
logger.warn(warnMsg)
|
||||||
|
|
||||||
if choice == 2:
|
if choice == 1:
|
||||||
|
goUdf = True
|
||||||
|
|
||||||
|
elif kb.dbms == "PostgreSQL":
|
||||||
goUdf = True
|
goUdf = True
|
||||||
|
|
||||||
if goUdf is True:
|
if goUdf is True:
|
||||||
|
|
Loading…
Reference in New Issue
Block a user