Skip to content

Commit 03a6739

Browse files
committed
Minor layout adjustments
1 parent 150abc0 commit 03a6739

File tree

2 files changed

+9
-3
lines changed

2 files changed

+9
-3
lines changed

lib/takeover/metasploit.py

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -399,8 +399,13 @@ def __forgeMsfPayloadCmd(self, exitfunc, format, outFile, extra=None):
399399
if extra is not None:
400400
self.__payloadCmd += " %s" % extra
401401

402-
# TODO: payload stager for Linux can not be encoded as long as
403-
# Metasploit developers do not commit my minor patch for msfencode
402+
# NOTE: payload stager for Linux can only be encoded if the
403+
# Metasploit working copy has been updated after May 11, 2009
404+
# (http://trac.metasploit.com/changeset/6543)
405+
#
406+
# TODO: remember to update this code as soon as Metasploit
407+
# Framework 3.3 is out officially and update the user's manual to
408+
# notify that sqlmap depends upon Metasploit Framework 3.3
404409
else:
405410
self.__payloadCmd += " X > %s" % outFile
406411

plugins/dbms/mssqlserver.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -604,13 +604,14 @@ def overflowBypassDEP(self):
604604

605605
logger.info("restarting Microsoft SQL Server, wait..")
606606
time.sleep(15)
607+
607608
# TODO: use 'sc' to:
608609
# * Warn the user that sqlmap needs to restart the SQL Server
609610
# service, ask for confirmation
610611
# * Stop the SQL Server service (after handling DEP)
611612
# * Start the SQL Server service (after handling DEP)
612613

613-
# Another way to restart MSSQL consists of writing a bat file with
614+
# Another way to restart MSSQL consists of writing a bat file with
614615
# the following text:
615616
#
616617
#@ECHO OFF

0 commit comments

Comments
 (0)