From 8be91a98cc0dfe1b7ca052d31f7a092b4b9154ba Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Sat, 29 May 2010 15:28:37 +0000 Subject: [PATCH] Minor bug fix and adjustment --- lib/takeover/metasploit.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lib/takeover/metasploit.py b/lib/takeover/metasploit.py index 3e1eb80f8..d46f630aa 100644 --- a/lib/takeover/metasploit.py +++ b/lib/takeover/metasploit.py @@ -121,8 +121,8 @@ class Metasploit: self.__msfSMBPortsList = { "windows": { - 1: ( "139/TCP (default)", "139" ), - 2: ( "445/TCP", "445" ), + 1: ( "139/TCP", "139" ), + 2: ( "445/TCP (default)", "445" ), } } @@ -547,7 +547,7 @@ class Metasploit: errMsg = "failed to create the shellcode (%s)" % payloadStderr.replace("\n", "") raise sqlmapFilePathException, errMsg - self.__shellcodeFP = codecs.open(self.__shellcodeFilePath, "rb", conf.dataEncoding) + self.__shellcodeFP = codecs.open(self.__shellcodeFilePath, "rb") self.shellcodeString = self.__shellcodeFP.read() self.__shellcodeFP.close()