Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 6c1ec9b

Browse files
committed
Fix for an Issue #318
1 parent 35728fa commit 6c1ec9b

3 files changed

Lines changed: 15 additions & 15 deletions

File tree

lib/takeover/icmpsh.py

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ def _initVars(self):
3030
self.rhostStr = None
3131
self.localIP = getLocalIP()
3232
self.remoteIP = getRemoteIP()
33-
self.__icmpslave = normalizePath(os.path.join(paths.SQLMAP_EXTRAS_PATH, "icmpsh", "icmpsh.exe"))
33+
self._icmpslave = normalizePath(os.path.join(paths.SQLMAP_EXTRAS_PATH, "icmpsh", "icmpsh.exe"))
3434

3535
def _selectRhost(self):
3636
message = "what is the back-end DBMS address? [%s] " % self.remoteIP
@@ -63,7 +63,7 @@ def _runIcmpshSlaveRemote(self):
6363
self.execCmd(cmd, silent=True)
6464

6565
def uploadIcmpshSlave(self, web=False):
66-
self._initVars()
66+
ICMPsh._initVars(self)
6767
self._randStr = randomStr(lowercase=True)
6868
self._icmpslaveRemoteBase = "tmpi%s.exe" % self._randStr
6969

@@ -77,9 +77,9 @@ def uploadIcmpshSlave(self, web=False):
7777
logger.info("uploading icmpsh slave to '%s'" % self._icmpslaveRemote)
7878

7979
if web:
80-
self.webUpload(self._icmpslaveRemote, self.webDirectory, filepath=self.__icmpslave)
80+
self.webUpload(self._icmpslaveRemote, self.webDirectory, filepath=self._icmpslave)
8181
else:
82-
self.writeFile(self.__icmpslave, self._icmpslaveRemote, "binary")
82+
self.writeFile(self._icmpslave, self._icmpslaveRemote, "binary")
8383

8484
def icmpPwn(self):
8585
self._prepareIngredients()

lib/takeover/metasploit.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -503,7 +503,7 @@ def createMsfShellcode(self, exitfunc, format, extra, encode):
503503
self._randStr = randomStr(lowercase=True)
504504
self._shellcodeFilePath = os.path.join(conf.outputPath, "tmpm%s" % self._randStr)
505505

506-
self._initVars()
506+
Metasploit._initVars(self)
507507
self._prepareIngredients(encode=encode)
508508
self._forgeMsfPayloadCmd(exitfunc, format, self._shellcodeFilePath, extra)
509509

@@ -583,7 +583,7 @@ def pwn(self, goUdf=False):
583583
self.delRemoteFile(self.shellcodeexecRemote)
584584

585585
def smb(self):
586-
self._initVars()
586+
Metasploit._initVars(self)
587587
self._randFile = "tmpu%s.txt" % randomStr(lowercase=True)
588588

589589
self._runMsfCliSmbrelay()

lib/takeover/registry.py

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -49,11 +49,11 @@ def _initVars(self, regKey, regValue, regType=None, regData=None, parse=False):
4949
def _createLocalBatchFile(self):
5050
self._batPathFp = open(self._batPathLocal, "w")
5151

52-
if self.__operation == "read":
52+
if self._operation == "read":
5353
lines = self._batRead
54-
elif self.__operation == "add":
54+
elif self._operation == "add":
5555
lines = self._batAdd
56-
elif self.__operation == "delete":
56+
elif self._operation == "delete":
5757
lines = self._batDel
5858

5959
for line in lines:
@@ -70,9 +70,9 @@ def _createRemoteBatchFile(self):
7070
os.unlink(self._batPathLocal)
7171

7272
def readRegKey(self, regKey, regValue, parse=False):
73-
self.__operation = "read"
73+
self._operation = "read"
7474

75-
self._initVars(regKey, regValue, parse=parse)
75+
Registry._initVars(self, regKey, regValue, parse=parse)
7676
self._createRemoteBatchFile()
7777

7878
logger.debug("reading registry key '%s' value '%s'" % (regKey, regValue))
@@ -90,9 +90,9 @@ def readRegKey(self, regKey, regValue, parse=False):
9090
return data
9191

9292
def addRegKey(self, regKey, regValue, regType, regData):
93-
self.__operation = "add"
93+
self._operation = "add"
9494

95-
self._initVars(regKey, regValue, regType, regData)
95+
Registry._initVars(self, regKey, regValue, regType, regData)
9696
self._createRemoteBatchFile()
9797

9898
debugMsg = "adding registry key value '%s' " % self._regValue
@@ -103,9 +103,9 @@ def addRegKey(self, regKey, regValue, regType, regData):
103103
self.delRemoteFile(self._batPathRemote)
104104

105105
def delRegKey(self, regKey, regValue):
106-
self.__operation = "delete"
106+
self._operation = "delete"
107107

108-
self._initVars(regKey, regValue)
108+
Registry._initVars(self, regKey, regValue)
109109
self._createRemoteBatchFile()
110110

111111
debugMsg = "deleting registry key value '%s' " % self._regValue

0 commit comments

Comments
 (0)