Minor cosmetic adjustments

This commit is contained in:
Bernardo Damele 2010-01-28 17:07:34 +00:00
parent a2077bfc0e
commit 6f5d2ed171
5 changed files with 13 additions and 10 deletions

View File

@ -1,7 +1,7 @@
Due to the anti-virus positive detection of executable stored inside this folder, Due to the anti-virus positive detection of executable stored inside this folder,
we needed to somehow circumvent this. As from the plain sqlmap users perspective nothing we needed to somehow circumvent this. As from the plain sqlmap users perspective nothing
has to be done prior to it's usage by sqlmap, but if you want to have access to the has to be done prior to its usage by sqlmap, but if you want to have access to the
original use the decrypt functionality of the ../extra/cloak/cloak.py utility. original executable use the decrypt functionality of the ../extra/cloak/cloak.py utility.
To prepare the executable to the cloaked form use this command: To prepare the executable to the cloaked form use this command:
python ../extra/cloak/cloak.py -i Churrasco.exe python ../extra/cloak/cloak.py -i Churrasco.exe

View File

@ -32,6 +32,7 @@ import time
import urlparse import urlparse
import ntpath import ntpath
import posixpath import posixpath
from tempfile import NamedTemporaryFile from tempfile import NamedTemporaryFile
from extra.cloak.cloak import decloak from extra.cloak.cloak import decloak

View File

@ -36,6 +36,7 @@ from lib.core.agent import agent
from lib.core.common import dataToStdout from lib.core.common import dataToStdout
from lib.core.common import getLocalIP from lib.core.common import getLocalIP
from lib.core.common import getRemoteIP from lib.core.common import getRemoteIP
from lib.core.common import normalizePath
from lib.core.common import pollProcess from lib.core.common import pollProcess
from lib.core.common import randomRange from lib.core.common import randomRange
from lib.core.common import randomStr from lib.core.common import randomStr
@ -647,6 +648,8 @@ class Metasploit:
else: else:
self.exeFilePathRemote = "%s/%s" % (conf.tmpPath, os.path.basename(self.exeFilePathLocal)) self.exeFilePathRemote = "%s/%s" % (conf.tmpPath, os.path.basename(self.exeFilePathLocal))
self.exeFilePathRemote = normalizePath(self.exeFilePathRemote)
logger.info("uploading payload stager to '%s'" % self.exeFilePathRemote) logger.info("uploading payload stager to '%s'" % self.exeFilePathRemote)
if web: if web:

View File

@ -76,9 +76,9 @@ class Web:
return output return output
def webFileUpload(self, fileToUpload, destFileName, directory): def webFileUpload(self, fileToUpload, destFileName, directory):
file = open(fileToUpload, "r") inputFile = open(fileToUpload, "r")
self.__webFileStreamUpload(file, destFileName, directory) self.__webFileStreamUpload(inputFile, destFileName, directory)
file.close() inputFile.close()
def __webFileStreamUpload(self, stream, destFileName, directory): def __webFileStreamUpload(self, stream, destFileName, directory):
if self.webApi == "php": if self.webApi == "php":
@ -89,7 +89,7 @@ class Web:
} }
page = Request.getPage(url=self.webUploaderUrl, multipart=multipartParams) page = Request.getPage(url=self.webUploaderUrl, multipart=multipartParams)
if "Backdoor uploaded" not in page: if "File uploaded" not in page:
warnMsg = "unable to upload the backdoor through " warnMsg = "unable to upload the backdoor through "
warnMsg += "the uploader agent on '%s'" % directory warnMsg += "the uploader agent on '%s'" % directory
logger.warn(warnMsg) logger.warn(warnMsg)
@ -179,7 +179,7 @@ class Web:
self.webUploaderUrl = self.webUploaderUrl.replace("./", "/").replace("\\", "/") self.webUploaderUrl = self.webUploaderUrl.replace("./", "/").replace("\\", "/")
uplPage, _ = Request.getPage(url=self.webUploaderUrl, direct=True) uplPage, _ = Request.getPage(url=self.webUploaderUrl, direct=True)
if "sqlmap backdoor uploader" not in uplPage: if "sqlmap file uploader" not in uplPage:
warnMsg = "unable to upload the uploader " warnMsg = "unable to upload the uploader "
warnMsg += "agent on '%s'" % directory warnMsg += "agent on '%s'" % directory
logger.warn(warnMsg) logger.warn(warnMsg)
@ -202,4 +202,3 @@ class Web:
break break
backdoorStream.name = backdoorStream.old_name backdoorStream.name = backdoorStream.old_name

Binary file not shown.