Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 36b0ece

Browse files
committed
Minor message update
1 parent 7d8fbab commit 36b0ece

3 files changed

Lines changed: 5 additions & 8 deletions

File tree

lib/core/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
from lib.core.enums import OS
2020

2121
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
22-
VERSION = "1.2.4.22"
22+
VERSION = "1.2.4.23"
2323
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
2424
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
2525
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

lib/takeover/metasploit.py

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -675,13 +675,10 @@ def uploadShellcodeexec(self, web=False):
675675
written = self.writeFile(self.shellcodeexecLocal, self.shellcodeexecRemote, "binary", forceCheck=True)
676676

677677
if written is not True:
678-
errMsg = "there has been a problem uploading shellcodeexec, it "
678+
errMsg = "there has been a problem uploading shellcodeexec. It "
679679
errMsg += "looks like the binary file has not been written "
680680
errMsg += "on the database underlying file system or an AV has "
681-
errMsg += "flagged it as malicious and removed it. In such a case "
682-
errMsg += "it is recommended to recompile shellcodeexec with "
683-
errMsg += "slight modification to the source code or pack it "
684-
errMsg += "with an obfuscator software"
681+
errMsg += "flagged it as malicious and removed it"
685682
logger.error(errMsg)
686683

687684
return False

txt/checksum.md5

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ c9a56e58984420a5abb7a3f7aadc196d lib/core/optiondict.py
4646
0c3eef46bdbf87e29a3f95f90240d192 lib/core/replication.py
4747
a7db43859b61569b601b97f187dd31c5 lib/core/revision.py
4848
fcb74fcc9577523524659ec49e2e964b lib/core/session.py
49-
2fb08059839ea1dc9972548c58e210e9 lib/core/settings.py
49+
f7b4a41eb39e717f89c55b0a90348e87 lib/core/settings.py
5050
0dfc2ed40adf72e302291f6ecd4406f6 lib/core/shell.py
5151
a7edc9250d13af36ac0108f259859c19 lib/core/subprocessng.py
5252
6306284edcccc185b2df085438572b0d lib/core/target.py
@@ -82,7 +82,7 @@ aa809d825b33bea76a63ecd97cf7792c lib/request/redirecthandler.py
8282
8d31425f36a7a9c093eb9bef44589593 lib/takeover/abstraction.py
8383
acc1db3667bf910b809eb279b60595eb lib/takeover/icmpsh.py
8484
1e5532ede194ac9c083891c2f02bca93 lib/takeover/__init__.py
85-
b1a6689e92e6ce998337bd41d8b09d6e lib/takeover/metasploit.py
85+
46ff5840b29531412bcaa05dac190413 lib/takeover/metasploit.py
8686
fb9e34d558293b5d6b9727f440712886 lib/takeover/registry.py
8787
48575dde7bb867b7937769f569a98309 lib/takeover/udf.py
8888
4584ac6ee5c13d4d395f0a7a21d8478c lib/takeover/web.py

0 commit comments

Comments
 (0)