Minor adjustment to reflect Metasploit r6849 (http://trac.metasploit.com/changeset/6849) and minor code refactoring.

This commit is contained in:
Bernardo Damele 2009-07-20 14:36:33 +00:00
parent 8096a37940
commit b4fd71e8b9
3 changed files with 20 additions and 8 deletions

View File

@ -781,11 +781,13 @@ def pollProcess(process):
returncode = process.poll()
if returncode != None:
if returncode is not None:
if returncode == 0:
dataToStdout(" done\n")
else:
dataToStdout(" quit unexpectedly by signal %d\n" % returncode)
elif returncode < 0:
dataToStdout(" process terminated by signal %d\n" % returncode)
elif returncode > 0:
dataToStdout(" quit unexpectedly with return code %d\n" % returncode)
break

View File

@ -30,7 +30,7 @@ import sys
# sqlmap version and site
VERSION = "0.7rc4"
VERSION = "0.7rc5"
VERSION_STRING = "sqlmap/%s" % VERSION
SITE = "http://sqlmap.sourceforge.net"

View File

@ -78,15 +78,25 @@ class UPX:
dataToStdout("\r[%s] [INFO] compression in progress " % time.strftime("%X"))
pollProcess(process)
upxStderr = process.communicate()[1]
upxStdout, upxStderr = process.communicate()
if upxStderr:
logger.warn("failed to compress the file")
warnMsg = "failed to compress the file"
if "NotCompressibleException" in upxStdout:
warnMsg += " because you provided a Metasploit version above "
warnMsg += "3.3-dev revision 6681. This will not inficiate "
warnMsg += "the correct execution of sqlmap. It might "
warnMsg += "only slow down a bit the execution of sqlmap"
logger.info(warnMsg)
elif upxStderr:
logger.warn(warnMsg)
return None
else:
return os.path.getsize(srcFile)
return None
def unpack(self, srcFile, dstFile=None):
pass