@@ -193,9 +193,9 @@ def __selectEncoder(self, encode=True):
193
193
def __selectPayload (self , askChurrasco = True ):
194
194
if kb .os == "Windows" and conf .privEsc == True :
195
195
infoMsg = "forcing Metasploit payload to Meterpreter because "
196
- infoMsg += "it is the only payload that can be used to abuse "
197
- infoMsg += "Windows Impersonation Tokens via Meterpreter "
198
- infoMsg += "'incognito' extension to privilege escalate"
196
+ infoMsg += "it is the only payload that can abuse Windows "
197
+ infoMsg += "Access Tokens via Meterpreter 'incognito' "
198
+ infoMsg += "extension to privilege escalate"
199
199
logger .info (infoMsg )
200
200
201
201
__payloadStr = "windows/meterpreter"
@@ -224,15 +224,15 @@ def __selectPayload(self, askChurrasco=True):
224
224
choose = True
225
225
226
226
warnMsg = "it is unlikely that the VNC injection will be "
227
- warnMsg += "successful because often Microsoft SQL Server "
227
+ warnMsg += "successful because usually Microsoft SQL Server "
228
228
warnMsg += "%s runs as Network Service " % kb .dbmsVersion [0 ]
229
229
warnMsg += "or the Administrator is not logged in"
230
230
logger .warn (warnMsg )
231
231
232
232
if choose == True :
233
233
message = "what do you want to do?\n "
234
234
message += "[1] Give it a try anyway\n "
235
- message += "[2] Fall back to reflective Meterpreter payload (default)\n "
235
+ message += "[2] Fall back to Meterpreter payload (default)\n "
236
236
message += "[3] Fall back to Shell payload"
237
237
238
238
while True :
@@ -572,8 +572,8 @@ def createMsfShellcode(self, exitfunc, format, extra, encode):
572
572
errMsg = "failed to create the shellcode (%s)" % payloadStderr .replace ("\n " , "" )
573
573
raise sqlmapFilePathException , errMsg
574
574
575
- self .__shellcodeFP = open (self .__shellcodeFilePath , "rb" )
576
- self .shellcodeString = self .__shellcodeFP .read ()
575
+ self .__shellcodeFP = open (self .__shellcodeFilePath , "rb" )
576
+ self .shellcodeString = self .__shellcodeFP .read ()
577
577
self .__shellcodeFP .close ()
578
578
579
579
os .unlink (self .__shellcodeFilePath )
0 commit comments