From 98f9f3e774f73de49df6cdecd0fbdd56107384a3 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Mon, 25 Apr 2011 00:03:12 +0000 Subject: [PATCH] Minor bug fix in local shellcodeexec for Windows path --- lib/takeover/metasploit.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/takeover/metasploit.py b/lib/takeover/metasploit.py index c80b39386..26b535849 100644 --- a/lib/takeover/metasploit.py +++ b/lib/takeover/metasploit.py @@ -539,7 +539,7 @@ class Metasploit: self.shellcodeexecLocal = paths.SQLMAP_SEXEC_PATH if Backend.isOs(OS.WINDOWS): - self.shellcodeexecLocal += "/windows/shellcodeexec/shellcodeexec.x%s.exe" % Backend.getArch() + self.shellcodeexecLocal += "/windows/shellcodeexec.x%s.exe" % Backend.getArch() else: self.shellcodeexecLocal += "/linux/shellcodeexec.x%s" % Backend.getArch()