mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-05-15 13:13:46 +03:00
Minor layout adjustments
This commit is contained in:
parent
c332c72808
commit
e28b98a366
|
@ -193,9 +193,9 @@ class Metasploit:
|
||||||
def __selectPayload(self, askChurrasco=True):
|
def __selectPayload(self, askChurrasco=True):
|
||||||
if kb.os == "Windows" and conf.privEsc == True:
|
if kb.os == "Windows" and conf.privEsc == True:
|
||||||
infoMsg = "forcing Metasploit payload to Meterpreter because "
|
infoMsg = "forcing Metasploit payload to Meterpreter because "
|
||||||
infoMsg += "it is the only payload that can be used to abuse "
|
infoMsg += "it is the only payload that can abuse Windows "
|
||||||
infoMsg += "Windows Impersonation Tokens via Meterpreter "
|
infoMsg += "Access Tokens via Meterpreter 'incognito' "
|
||||||
infoMsg += "'incognito' extension to privilege escalate"
|
infoMsg += "extension to privilege escalate"
|
||||||
logger.info(infoMsg)
|
logger.info(infoMsg)
|
||||||
|
|
||||||
__payloadStr = "windows/meterpreter"
|
__payloadStr = "windows/meterpreter"
|
||||||
|
@ -224,7 +224,7 @@ class Metasploit:
|
||||||
choose = True
|
choose = True
|
||||||
|
|
||||||
warnMsg = "it is unlikely that the VNC injection will be "
|
warnMsg = "it is unlikely that the VNC injection will be "
|
||||||
warnMsg += "successful because often Microsoft SQL Server "
|
warnMsg += "successful because usually Microsoft SQL Server "
|
||||||
warnMsg += "%s runs as Network Service " % kb.dbmsVersion[0]
|
warnMsg += "%s runs as Network Service " % kb.dbmsVersion[0]
|
||||||
warnMsg += "or the Administrator is not logged in"
|
warnMsg += "or the Administrator is not logged in"
|
||||||
logger.warn(warnMsg)
|
logger.warn(warnMsg)
|
||||||
|
@ -232,7 +232,7 @@ class Metasploit:
|
||||||
if choose == True:
|
if choose == True:
|
||||||
message = "what do you want to do?\n"
|
message = "what do you want to do?\n"
|
||||||
message += "[1] Give it a try anyway\n"
|
message += "[1] Give it a try anyway\n"
|
||||||
message += "[2] Fall back to reflective Meterpreter payload (default)\n"
|
message += "[2] Fall back to Meterpreter payload (default)\n"
|
||||||
message += "[3] Fall back to Shell payload"
|
message += "[3] Fall back to Shell payload"
|
||||||
|
|
||||||
while True:
|
while True:
|
||||||
|
@ -572,8 +572,8 @@ class Metasploit:
|
||||||
errMsg = "failed to create the shellcode (%s)" % payloadStderr.replace("\n", "")
|
errMsg = "failed to create the shellcode (%s)" % payloadStderr.replace("\n", "")
|
||||||
raise sqlmapFilePathException, errMsg
|
raise sqlmapFilePathException, errMsg
|
||||||
|
|
||||||
self.__shellcodeFP = open(self.__shellcodeFilePath, "rb")
|
self.__shellcodeFP = open(self.__shellcodeFilePath, "rb")
|
||||||
self.shellcodeString = self.__shellcodeFP.read()
|
self.shellcodeString = self.__shellcodeFP.read()
|
||||||
self.__shellcodeFP.close()
|
self.__shellcodeFP.close()
|
||||||
|
|
||||||
os.unlink(self.__shellcodeFilePath)
|
os.unlink(self.__shellcodeFilePath)
|
||||||
|
|
Loading…
Reference in New Issue
Block a user