Skip to content

Commit e28b98a

Browse files
committed
Minor layout adjustments
1 parent c332c72 commit e28b98a

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

lib/takeover/metasploit.py

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -193,9 +193,9 @@ def __selectEncoder(self, encode=True):
193193
def __selectPayload(self, askChurrasco=True):
194194
if kb.os == "Windows" and conf.privEsc == True:
195195
infoMsg = "forcing Metasploit payload to Meterpreter because "
196-
infoMsg += "it is the only payload that can be used to abuse "
197-
infoMsg += "Windows Impersonation Tokens via Meterpreter "
198-
infoMsg += "'incognito' extension to privilege escalate"
196+
infoMsg += "it is the only payload that can abuse Windows "
197+
infoMsg += "Access Tokens via Meterpreter 'incognito' "
198+
infoMsg += "extension to privilege escalate"
199199
logger.info(infoMsg)
200200

201201
__payloadStr = "windows/meterpreter"
@@ -224,15 +224,15 @@ def __selectPayload(self, askChurrasco=True):
224224
choose = True
225225

226226
warnMsg = "it is unlikely that the VNC injection will be "
227-
warnMsg += "successful because often Microsoft SQL Server "
227+
warnMsg += "successful because usually Microsoft SQL Server "
228228
warnMsg += "%s runs as Network Service " % kb.dbmsVersion[0]
229229
warnMsg += "or the Administrator is not logged in"
230230
logger.warn(warnMsg)
231231

232232
if choose == True:
233233
message = "what do you want to do?\n"
234234
message += "[1] Give it a try anyway\n"
235-
message += "[2] Fall back to reflective Meterpreter payload (default)\n"
235+
message += "[2] Fall back to Meterpreter payload (default)\n"
236236
message += "[3] Fall back to Shell payload"
237237

238238
while True:
@@ -572,8 +572,8 @@ def createMsfShellcode(self, exitfunc, format, extra, encode):
572572
errMsg = "failed to create the shellcode (%s)" % payloadStderr.replace("\n", "")
573573
raise sqlmapFilePathException, errMsg
574574

575-
self.__shellcodeFP = open(self.__shellcodeFilePath, "rb")
576-
self.shellcodeString = self.__shellcodeFP.read()
575+
self.__shellcodeFP = open(self.__shellcodeFilePath, "rb")
576+
self.shellcodeString = self.__shellcodeFP.read()
577577
self.__shellcodeFP.close()
578578

579579
os.unlink(self.__shellcodeFilePath)

0 commit comments

Comments
 (0)