From 435f48b8cc513b81b26e4ad05b607ce3afe2a22c Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Fri, 10 Dec 2010 15:28:56 +0000 Subject: [PATCH] polite cosmetics --- lib/request/connect.py | 2 +- lib/takeover/metasploit.py | 8 ++++---- lib/takeover/xp_cmdshell.py | 2 +- plugins/dbms/mssqlserver/filesystem.py | 2 +- plugins/dbms/mssqlserver/takeover.py | 2 +- plugins/generic/filesystem.py | 2 +- 6 files changed, 9 insertions(+), 9 deletions(-) diff --git a/lib/request/connect.py b/lib/request/connect.py index ac92bbddb..1db7ee96b 100644 --- a/lib/request/connect.py +++ b/lib/request/connect.py @@ -388,7 +388,7 @@ class Connect: if timeBasedCompare: if len(kb.responseTimes) < MIN_TIME_RESPONSES: warnMsg = "time-based comparison needs larger statistical " - warnMsg += "model. Making a few dummy requests, wait.." + warnMsg += "model. Making a few dummy requests, please wait.." logger.warn(warnMsg) while len(kb.responseTimes) < MIN_TIME_RESPONSES: diff --git a/lib/takeover/metasploit.py b/lib/takeover/metasploit.py index abbe566d0..c9876221e 100644 --- a/lib/takeover/metasploit.py +++ b/lib/takeover/metasploit.py @@ -368,14 +368,14 @@ class Metasploit: self.__forgeMsfCliCmd(exitfunc) infoMsg = "running Metasploit Framework 3 command line " - infoMsg += "interface locally, wait.." + infoMsg += "interface locally, please wait.." logger.info(infoMsg) logger.debug("executing local command: %s" % self.__cliCmd) self.__msfCliProc = execute(self.__cliCmd, shell=True, stdin=PIPE, stdout=PIPE, stderr=PIPE) def __runMsfConsole(self): - infoMsg = "running Metasploit Framework 3 console locally, wait.." + infoMsg = "running Metasploit Framework 3 console locally, please wait.." logger.info(infoMsg) logger.debug("executing local command: %s" % self.__consoleCmd) @@ -383,14 +383,14 @@ class Metasploit: def __runMsfShellcodeRemote(self): infoMsg = "running Metasploit Framework 3 shellcode " - infoMsg += "remotely via UDF 'sys_bineval', wait.." + infoMsg += "remotely via UDF 'sys_bineval', please wait.." logger.info(infoMsg) self.udfExecCmd("'%s'" % self.shellcodeString, silent=True, udfName="sys_bineval") def __runMsfPayloadRemote(self): infoMsg = "running Metasploit Framework 3 payload stager " - infoMsg += "remotely, wait.." + infoMsg += "remotely, please wait.." logger.info(infoMsg) if kb.os != "Windows": diff --git a/lib/takeover/xp_cmdshell.py b/lib/takeover/xp_cmdshell.py index f8c044492..e04f5e5e4 100644 --- a/lib/takeover/xp_cmdshell.py +++ b/lib/takeover/xp_cmdshell.py @@ -134,7 +134,7 @@ class xp_cmdshell: self.__xpCmdshellAvailable = False infoMsg = "checking if xp_cmdshell extended procedure is " - infoMsg += "available, wait.." + infoMsg += "available, please wait.." logger.info(infoMsg) result = self.__xpCmdshellCheck() diff --git a/plugins/dbms/mssqlserver/filesystem.py b/plugins/dbms/mssqlserver/filesystem.py index 24b6c1f7c..e27f63a8b 100644 --- a/plugins/dbms/mssqlserver/filesystem.py +++ b/plugins/dbms/mssqlserver/filesystem.py @@ -153,7 +153,7 @@ class Filesystem(GenericFilesystem): infoMsg = "the %s file is bigger than %d " % (fileType, debugSize) infoMsg += "bytes. sqlmap will split it into chunks, upload " infoMsg += "them and recreate the original file out of the " - infoMsg += "binary chunks server-side, wait.." + infoMsg += "binary chunks server-side, please wait.." logger.info(infoMsg) counter = 1 diff --git a/plugins/dbms/mssqlserver/takeover.py b/plugins/dbms/mssqlserver/takeover.py index 681c1e184..dce28decd 100644 --- a/plugins/dbms/mssqlserver/takeover.py +++ b/plugins/dbms/mssqlserver/takeover.py @@ -143,5 +143,5 @@ class Takeover(GenericTakeover): self.spExploit = self.spExploit.replace(" ", "").replace("\n", " ") - logger.info("triggering the buffer overflow vulnerability, wait..") + logger.info("triggering the buffer overflow vulnerability, please wait..") inject.goStacked(self.spExploit, silent=True) diff --git a/plugins/generic/filesystem.py b/plugins/generic/filesystem.py index 18615741b..dabff2ff0 100644 --- a/plugins/generic/filesystem.py +++ b/plugins/generic/filesystem.py @@ -193,7 +193,7 @@ class Filesystem: charCounter = 0 maxLen = 512 - logger.debug("generating binary file %s\%s, wait.." % (tmpPath, chunkName)) + logger.debug("generating binary file %s\%s, please wait.." % (tmpPath, chunkName)) for scrLine in fileScrLines: forgedScrLine = "echo %s " % scrLine