From 51a4cb04a578258da037f12440dc00a16fe5885a Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Thu, 3 Sep 2015 10:26:46 +0200 Subject: [PATCH] Another minor language patch --- lib/takeover/icmpsh.py | 4 ++-- lib/takeover/metasploit.py | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/lib/takeover/icmpsh.py b/lib/takeover/icmpsh.py index 35cfe9881..da64a7b4e 100644 --- a/lib/takeover/icmpsh.py +++ b/lib/takeover/icmpsh.py @@ -32,13 +32,13 @@ class ICMPsh: self._icmpslave = normalizePath(os.path.join(paths.SQLMAP_EXTRAS_PATH, "icmpsh", "icmpsh.exe_")) def _selectRhost(self): - message = "what is the back-end DBMS address? [%s] " % self.remoteIP + message = "what is the back-end DBMS address? [Enter for '%s' (detected)] " % self.remoteIP address = readInput(message, default=self.remoteIP) return address def _selectLhost(self): - message = "what is the local address? [%s] " % self.localIP + message = "what is the local address? [Enter for '%s' (detected)] " % self.localIP address = readInput(message, default=self.localIP) return address diff --git a/lib/takeover/metasploit.py b/lib/takeover/metasploit.py index 8befc81ca..10d3a3022 100644 --- a/lib/takeover/metasploit.py +++ b/lib/takeover/metasploit.py @@ -292,7 +292,7 @@ class Metasploit: def _selectRhost(self): if self.connectionStr.startswith("bind"): - message = "what is the back-end DBMS address? [%s] " % self.remoteIP + message = "what is the back-end DBMS address? [Enter for '%s' (detected)] " % self.remoteIP address = readInput(message, default=self.remoteIP) if not address: @@ -308,7 +308,7 @@ class Metasploit: def _selectLhost(self): if self.connectionStr.startswith("reverse"): - message = "what is the local address? [%s] " % self.localIP + message = "what is the local address? [Enter for '%s' (detected)] " % self.localIP address = readInput(message, default=self.localIP) if not address: