mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-12-06 12:41:30 +00:00
some fixes regarding registry reading
This commit is contained in:
@@ -45,7 +45,7 @@ class Registry:
|
|||||||
self.__batPathLocal = os.path.join(conf.outputPath, "tmpr%s.bat" % self.__randStr)
|
self.__batPathLocal = os.path.join(conf.outputPath, "tmpr%s.bat" % self.__randStr)
|
||||||
|
|
||||||
if parse:
|
if parse:
|
||||||
readParse = "FOR /F \"tokens=2* delims==\" %%A IN ('REG QUERY \"" + self.__regKey + "\" /v \"" + self.__regValue + "\"') DO SET value=%%A\r\nECHO %value%\r\n"
|
readParse = "FOR /F \"tokens=1* delims= \" %%A IN ('REG QUERY \"" + self.__regKey + "\" /v \"" + self.__regValue + "\"') DO SET value=%%A\r\nECHO %value%\r\n"
|
||||||
else:
|
else:
|
||||||
readParse = "REG QUERY \"" + self.__regKey + "\" /v \"" + self.__regValue + "\""
|
readParse = "REG QUERY \"" + self.__regKey + "\" /v \"" + self.__regValue + "\""
|
||||||
|
|
||||||
|
|||||||
@@ -348,7 +348,7 @@ class Takeover(Abstraction, Metasploit, Registry):
|
|||||||
infoMsg = "reading Windows registry path '%s\%s' " % (regKey, regVal)
|
infoMsg = "reading Windows registry path '%s\%s' " % (regKey, regVal)
|
||||||
logger.info(infoMsg)
|
logger.info(infoMsg)
|
||||||
|
|
||||||
return self.readRegKey(regKey, regVal, False)
|
return self.readRegKey(regKey, regVal, True)
|
||||||
|
|
||||||
def regAdd(self):
|
def regAdd(self):
|
||||||
self.__regInit()
|
self.__regInit()
|
||||||
|
|||||||
Reference in New Issue
Block a user