mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-12-06 12:41:30 +00:00
now runcmd exe has random name too
This commit is contained in:
@@ -200,11 +200,11 @@ class Web:
|
|||||||
logger.info(infoMsg)
|
logger.info(infoMsg)
|
||||||
|
|
||||||
if self.webApi == "asp":
|
if self.webApi == "asp":
|
||||||
runcmdName = 'runcmd.exe'
|
runcmdName = "tmpe%s.exe" % randomStr(4)
|
||||||
runcmdStream = decloakToNamedTemporaryFile(os.path.join(paths.SQLMAP_SHELL_PATH, runcmdName + '_'), runcmdName)
|
runcmdStream = decloakToNamedTemporaryFile(os.path.join(paths.SQLMAP_SHELL_PATH, 'runcmd.exe_'), runcmdName)
|
||||||
scriptsDirectory = "Scripts"
|
scriptsDirectory = "Scripts"
|
||||||
backdoorDirectory = "%s..\%s" % (posixToNtSlashes(directory), scriptsDirectory)
|
backdoorDirectory = "%s..\%s" % (posixToNtSlashes(directory), scriptsDirectory)
|
||||||
backdoorContent = backdoorContent.replace("WRITABLE_DIR", backdoorDirectory)
|
backdoorContent = backdoorContent.replace("WRITABLE_DIR", backdoorDirectory).replace("RUNCMD_EXE", runcmdName)
|
||||||
backdoorStream.file.truncate()
|
backdoorStream.file.truncate()
|
||||||
backdoorStream.read()
|
backdoorStream.read()
|
||||||
backdoorStream.seek(0)
|
backdoorStream.seek(0)
|
||||||
|
|||||||
Binary file not shown.
Reference in New Issue
Block a user