polite cosmetics

This commit is contained in:
Miroslav Stampar 2010-12-10 15:28:56 +00:00
parent 977988c0ab
commit 435f48b8cc
6 changed files with 9 additions and 9 deletions

View File

@ -388,7 +388,7 @@ class Connect:
if timeBasedCompare: if timeBasedCompare:
if len(kb.responseTimes) < MIN_TIME_RESPONSES: if len(kb.responseTimes) < MIN_TIME_RESPONSES:
warnMsg = "time-based comparison needs larger statistical " warnMsg = "time-based comparison needs larger statistical "
warnMsg += "model. Making a few dummy requests, wait.." warnMsg += "model. Making a few dummy requests, please wait.."
logger.warn(warnMsg) logger.warn(warnMsg)
while len(kb.responseTimes) < MIN_TIME_RESPONSES: while len(kb.responseTimes) < MIN_TIME_RESPONSES:

View File

@ -368,14 +368,14 @@ class Metasploit:
self.__forgeMsfCliCmd(exitfunc) self.__forgeMsfCliCmd(exitfunc)
infoMsg = "running Metasploit Framework 3 command line " infoMsg = "running Metasploit Framework 3 command line "
infoMsg += "interface locally, wait.." infoMsg += "interface locally, please wait.."
logger.info(infoMsg) logger.info(infoMsg)
logger.debug("executing local command: %s" % self.__cliCmd) logger.debug("executing local command: %s" % self.__cliCmd)
self.__msfCliProc = execute(self.__cliCmd, shell=True, stdin=PIPE, stdout=PIPE, stderr=PIPE) self.__msfCliProc = execute(self.__cliCmd, shell=True, stdin=PIPE, stdout=PIPE, stderr=PIPE)
def __runMsfConsole(self): def __runMsfConsole(self):
infoMsg = "running Metasploit Framework 3 console locally, wait.." infoMsg = "running Metasploit Framework 3 console locally, please wait.."
logger.info(infoMsg) logger.info(infoMsg)
logger.debug("executing local command: %s" % self.__consoleCmd) logger.debug("executing local command: %s" % self.__consoleCmd)
@ -383,14 +383,14 @@ class Metasploit:
def __runMsfShellcodeRemote(self): def __runMsfShellcodeRemote(self):
infoMsg = "running Metasploit Framework 3 shellcode " infoMsg = "running Metasploit Framework 3 shellcode "
infoMsg += "remotely via UDF 'sys_bineval', wait.." infoMsg += "remotely via UDF 'sys_bineval', please wait.."
logger.info(infoMsg) logger.info(infoMsg)
self.udfExecCmd("'%s'" % self.shellcodeString, silent=True, udfName="sys_bineval") self.udfExecCmd("'%s'" % self.shellcodeString, silent=True, udfName="sys_bineval")
def __runMsfPayloadRemote(self): def __runMsfPayloadRemote(self):
infoMsg = "running Metasploit Framework 3 payload stager " infoMsg = "running Metasploit Framework 3 payload stager "
infoMsg += "remotely, wait.." infoMsg += "remotely, please wait.."
logger.info(infoMsg) logger.info(infoMsg)
if kb.os != "Windows": if kb.os != "Windows":

View File

@ -134,7 +134,7 @@ class xp_cmdshell:
self.__xpCmdshellAvailable = False self.__xpCmdshellAvailable = False
infoMsg = "checking if xp_cmdshell extended procedure is " infoMsg = "checking if xp_cmdshell extended procedure is "
infoMsg += "available, wait.." infoMsg += "available, please wait.."
logger.info(infoMsg) logger.info(infoMsg)
result = self.__xpCmdshellCheck() result = self.__xpCmdshellCheck()

View File

@ -153,7 +153,7 @@ class Filesystem(GenericFilesystem):
infoMsg = "the %s file is bigger than %d " % (fileType, debugSize) infoMsg = "the %s file is bigger than %d " % (fileType, debugSize)
infoMsg += "bytes. sqlmap will split it into chunks, upload " infoMsg += "bytes. sqlmap will split it into chunks, upload "
infoMsg += "them and recreate the original file out of the " infoMsg += "them and recreate the original file out of the "
infoMsg += "binary chunks server-side, wait.." infoMsg += "binary chunks server-side, please wait.."
logger.info(infoMsg) logger.info(infoMsg)
counter = 1 counter = 1

View File

@ -143,5 +143,5 @@ class Takeover(GenericTakeover):
self.spExploit = self.spExploit.replace(" ", "").replace("\n", " ") self.spExploit = self.spExploit.replace(" ", "").replace("\n", " ")
logger.info("triggering the buffer overflow vulnerability, wait..") logger.info("triggering the buffer overflow vulnerability, please wait..")
inject.goStacked(self.spExploit, silent=True) inject.goStacked(self.spExploit, silent=True)

View File

@ -193,7 +193,7 @@ class Filesystem:
charCounter = 0 charCounter = 0
maxLen = 512 maxLen = 512
logger.debug("generating binary file %s\%s, wait.." % (tmpPath, chunkName)) logger.debug("generating binary file %s\%s, please wait.." % (tmpPath, chunkName))
for scrLine in fileScrLines: for scrLine in fileScrLines:
forgedScrLine = "echo %s " % scrLine forgedScrLine = "echo %s " % scrLine