mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-02-16 19:40:37 +03:00
Meterpreter's sniffer extension freezes 64-bit systems
Meterpreter's priv extension is loaded by default since Metasploit 3.5 or so. There is no shellcodeexec 64-bit yet, anyway as the Metasploit payload is encoded with a 32-bit encoded (alphanumeric), it's all fine.
This commit is contained in:
parent
5a1c9a42a3
commit
d6b52242c7
|
@ -414,8 +414,8 @@ class Metasploit:
|
|||
|
||||
proc.stdin.write("use espia\n")
|
||||
proc.stdin.write("use incognito\n")
|
||||
proc.stdin.write("use priv\n")
|
||||
proc.stdin.write("use sniffer\n")
|
||||
# NOTE: this extension freezes the connection on 64-bit systems
|
||||
#proc.stdin.write("use sniffer\n")
|
||||
proc.stdin.write("sysinfo\n")
|
||||
proc.stdin.write("getuid\n")
|
||||
|
||||
|
@ -540,7 +540,7 @@ class Metasploit:
|
|||
self.shellcodeexecLocal = paths.SQLMAP_SEXEC_PATH
|
||||
|
||||
if Backend.isOs(OS.WINDOWS):
|
||||
self.shellcodeexecLocal += "/windows/shellcodeexec.x%s.exe" % Backend.getArch()
|
||||
self.shellcodeexecLocal += "/windows/shellcodeexec.x%s.exe" % "32"
|
||||
else:
|
||||
self.shellcodeexecLocal += "/linux/shellcodeexec.x%s" % Backend.getArch()
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user