mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-02-03 13:14:13 +03:00
polite cosmetics
This commit is contained in:
parent
977988c0ab
commit
435f48b8cc
|
@ -388,7 +388,7 @@ class Connect:
|
||||||
if timeBasedCompare:
|
if timeBasedCompare:
|
||||||
if len(kb.responseTimes) < MIN_TIME_RESPONSES:
|
if len(kb.responseTimes) < MIN_TIME_RESPONSES:
|
||||||
warnMsg = "time-based comparison needs larger statistical "
|
warnMsg = "time-based comparison needs larger statistical "
|
||||||
warnMsg += "model. Making a few dummy requests, wait.."
|
warnMsg += "model. Making a few dummy requests, please wait.."
|
||||||
logger.warn(warnMsg)
|
logger.warn(warnMsg)
|
||||||
|
|
||||||
while len(kb.responseTimes) < MIN_TIME_RESPONSES:
|
while len(kb.responseTimes) < MIN_TIME_RESPONSES:
|
||||||
|
|
|
@ -368,14 +368,14 @@ class Metasploit:
|
||||||
self.__forgeMsfCliCmd(exitfunc)
|
self.__forgeMsfCliCmd(exitfunc)
|
||||||
|
|
||||||
infoMsg = "running Metasploit Framework 3 command line "
|
infoMsg = "running Metasploit Framework 3 command line "
|
||||||
infoMsg += "interface locally, wait.."
|
infoMsg += "interface locally, please wait.."
|
||||||
logger.info(infoMsg)
|
logger.info(infoMsg)
|
||||||
|
|
||||||
logger.debug("executing local command: %s" % self.__cliCmd)
|
logger.debug("executing local command: %s" % self.__cliCmd)
|
||||||
self.__msfCliProc = execute(self.__cliCmd, shell=True, stdin=PIPE, stdout=PIPE, stderr=PIPE)
|
self.__msfCliProc = execute(self.__cliCmd, shell=True, stdin=PIPE, stdout=PIPE, stderr=PIPE)
|
||||||
|
|
||||||
def __runMsfConsole(self):
|
def __runMsfConsole(self):
|
||||||
infoMsg = "running Metasploit Framework 3 console locally, wait.."
|
infoMsg = "running Metasploit Framework 3 console locally, please wait.."
|
||||||
logger.info(infoMsg)
|
logger.info(infoMsg)
|
||||||
|
|
||||||
logger.debug("executing local command: %s" % self.__consoleCmd)
|
logger.debug("executing local command: %s" % self.__consoleCmd)
|
||||||
|
@ -383,14 +383,14 @@ class Metasploit:
|
||||||
|
|
||||||
def __runMsfShellcodeRemote(self):
|
def __runMsfShellcodeRemote(self):
|
||||||
infoMsg = "running Metasploit Framework 3 shellcode "
|
infoMsg = "running Metasploit Framework 3 shellcode "
|
||||||
infoMsg += "remotely via UDF 'sys_bineval', wait.."
|
infoMsg += "remotely via UDF 'sys_bineval', please wait.."
|
||||||
logger.info(infoMsg)
|
logger.info(infoMsg)
|
||||||
|
|
||||||
self.udfExecCmd("'%s'" % self.shellcodeString, silent=True, udfName="sys_bineval")
|
self.udfExecCmd("'%s'" % self.shellcodeString, silent=True, udfName="sys_bineval")
|
||||||
|
|
||||||
def __runMsfPayloadRemote(self):
|
def __runMsfPayloadRemote(self):
|
||||||
infoMsg = "running Metasploit Framework 3 payload stager "
|
infoMsg = "running Metasploit Framework 3 payload stager "
|
||||||
infoMsg += "remotely, wait.."
|
infoMsg += "remotely, please wait.."
|
||||||
logger.info(infoMsg)
|
logger.info(infoMsg)
|
||||||
|
|
||||||
if kb.os != "Windows":
|
if kb.os != "Windows":
|
||||||
|
|
|
@ -134,7 +134,7 @@ class xp_cmdshell:
|
||||||
self.__xpCmdshellAvailable = False
|
self.__xpCmdshellAvailable = False
|
||||||
|
|
||||||
infoMsg = "checking if xp_cmdshell extended procedure is "
|
infoMsg = "checking if xp_cmdshell extended procedure is "
|
||||||
infoMsg += "available, wait.."
|
infoMsg += "available, please wait.."
|
||||||
logger.info(infoMsg)
|
logger.info(infoMsg)
|
||||||
|
|
||||||
result = self.__xpCmdshellCheck()
|
result = self.__xpCmdshellCheck()
|
||||||
|
|
|
@ -153,7 +153,7 @@ class Filesystem(GenericFilesystem):
|
||||||
infoMsg = "the %s file is bigger than %d " % (fileType, debugSize)
|
infoMsg = "the %s file is bigger than %d " % (fileType, debugSize)
|
||||||
infoMsg += "bytes. sqlmap will split it into chunks, upload "
|
infoMsg += "bytes. sqlmap will split it into chunks, upload "
|
||||||
infoMsg += "them and recreate the original file out of the "
|
infoMsg += "them and recreate the original file out of the "
|
||||||
infoMsg += "binary chunks server-side, wait.."
|
infoMsg += "binary chunks server-side, please wait.."
|
||||||
logger.info(infoMsg)
|
logger.info(infoMsg)
|
||||||
|
|
||||||
counter = 1
|
counter = 1
|
||||||
|
|
|
@ -143,5 +143,5 @@ class Takeover(GenericTakeover):
|
||||||
|
|
||||||
self.spExploit = self.spExploit.replace(" ", "").replace("\n", " ")
|
self.spExploit = self.spExploit.replace(" ", "").replace("\n", " ")
|
||||||
|
|
||||||
logger.info("triggering the buffer overflow vulnerability, wait..")
|
logger.info("triggering the buffer overflow vulnerability, please wait..")
|
||||||
inject.goStacked(self.spExploit, silent=True)
|
inject.goStacked(self.spExploit, silent=True)
|
||||||
|
|
|
@ -193,7 +193,7 @@ class Filesystem:
|
||||||
charCounter = 0
|
charCounter = 0
|
||||||
maxLen = 512
|
maxLen = 512
|
||||||
|
|
||||||
logger.debug("generating binary file %s\%s, wait.." % (tmpPath, chunkName))
|
logger.debug("generating binary file %s\%s, please wait.." % (tmpPath, chunkName))
|
||||||
|
|
||||||
for scrLine in fileScrLines:
|
for scrLine in fileScrLines:
|
||||||
forgedScrLine = "echo %s " % scrLine
|
forgedScrLine = "echo %s " % scrLine
|
||||||
|
|
Loading…
Reference in New Issue
Block a user