mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-10-31 16:07:55 +03:00 
			
		
		
		
	Adapted sqlmap to latest changes in Metasploit trunk
This commit is contained in:
		
							parent
							
								
									aa14bea051
								
							
						
					
					
						commit
						1bf6a7cadc
					
				|  | @ -306,13 +306,12 @@ class Takeover(Abstraction, Metasploit, Registry): | |||
|         self.getRemoteTempPath() | ||||
| 
 | ||||
|         goUdf = False | ||||
|         condition = ( kb.dbms == "MySQL" or kb.dbms == "PostgreSQL" ) | ||||
| 
 | ||||
|         if condition is True: | ||||
|         if kb.dbms == "MySQL": | ||||
|             msg  = "how do you want to execute the Metasploit shellcode " | ||||
|             msg += "on the back-end database underlying operating system?" | ||||
|             msg += "\n[1] Stand-alone payload stager (file system way, default)" | ||||
|             msg += "\n[2] Via UDF 'sys_bineval' (in-memory way, anti-forensics)" | ||||
|             msg += "\n[1] Via UDF 'sys_bineval' (in-memory way, anti-forensics, default)" | ||||
|             msg += "\n[2] Stand-alone payload stager (file system way)" | ||||
| 
 | ||||
|             while True: | ||||
|                 choice = readInput(msg, default=1) | ||||
|  | @ -328,7 +327,10 @@ class Takeover(Abstraction, Metasploit, Registry): | |||
|                     warnMsg = "invalid value, valid values are 1 and 2" | ||||
|                     logger.warn(warnMsg) | ||||
| 
 | ||||
|             if choice == 2: | ||||
|             if choice == 1: | ||||
|                 goUdf = True | ||||
| 
 | ||||
|         elif kb.dbms == "PostgreSQL": | ||||
|             goUdf = True | ||||
| 
 | ||||
|         if goUdf is True: | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue
	
	Block a user