mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 17:46:37 +03:00
Major bug fix in takeover functionalities on Microsoft SQL Server
This commit is contained in:
parent
c6cae7da41
commit
7b8316728c
|
@ -42,7 +42,7 @@ sqlmap (0.8-1) stable; urgency=low
|
||||||
* Added simple file encryption/compression utility, extra/cloak/cloak.py
|
* Added simple file encryption/compression utility, extra/cloak/cloak.py
|
||||||
used by sqlmap to decrypt on the fly Churrasco executable and web
|
used by sqlmap to decrypt on the fly Churrasco executable and web
|
||||||
shells consequently reduced drastically the number of anti virus
|
shells consequently reduced drastically the number of anti virus
|
||||||
softwares that mistakenly mark sqlmap as a malware (Miroslav)
|
softwares that mistakenly mark sqlmap as a malware (Miroslav).
|
||||||
|
|
||||||
-- Bernardo Damele A. G. <bernardo.damele@gmail.com> Mon, 1 Mar 2010 10:00:00 +0000
|
-- Bernardo Damele A. G. <bernardo.damele@gmail.com> Mon, 1 Mar 2010 10:00:00 +0000
|
||||||
|
|
||||||
|
|
|
@ -103,7 +103,7 @@ class xp_cmdshell:
|
||||||
self.xpCmdshellExecCmd(cmd)
|
self.xpCmdshellExecCmd(cmd)
|
||||||
|
|
||||||
def __xpCmdshellCheck(self):
|
def __xpCmdshellCheck(self):
|
||||||
query = self.xpCmdshellForgeCmd("ping -n %d 127.0.0.1" % (conf.timeSec + 2))
|
query = self.xpCmdshellForgeCmd("ping -n %d 127.0.0.1" % (conf.timeSec * 2))
|
||||||
duration = timeUse(query)
|
duration = timeUse(query)
|
||||||
|
|
||||||
if duration >= conf.timeSec:
|
if duration >= conf.timeSec:
|
||||||
|
@ -112,14 +112,15 @@ class xp_cmdshell:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
def xpCmdshellForgeCmd(self, cmd):
|
def xpCmdshellForgeCmd(self, cmd):
|
||||||
return "EXEC %s '%s'" % (self.xpCmdshellStr, cmd)
|
forgedCmd = "EXEC %s '%s'" % (self.xpCmdshellStr, cmd)
|
||||||
|
forgedCmd = urlencode(forgedCmd, convall=True)
|
||||||
|
|
||||||
|
return forgedCmd
|
||||||
|
|
||||||
def xpCmdshellExecCmd(self, cmd, silent=False, forgeCmd=False):
|
def xpCmdshellExecCmd(self, cmd, silent=False, forgeCmd=False):
|
||||||
if forgeCmd:
|
if forgeCmd:
|
||||||
cmd = self.xpCmdshellForgeCmd(cmd)
|
cmd = self.xpCmdshellForgeCmd(cmd)
|
||||||
|
|
||||||
cmd = urlencode(cmd, convall=True)
|
|
||||||
|
|
||||||
inject.goStacked(cmd, silent)
|
inject.goStacked(cmd, silent)
|
||||||
|
|
||||||
def xpCmdshellEvalCmd(self, cmd, first=None, last=None):
|
def xpCmdshellEvalCmd(self, cmd, first=None, last=None):
|
||||||
|
|
Loading…
Reference in New Issue
Block a user