Another update for an Issue #28

This commit is contained in:
Miroslav Stampar
2012-07-27 17:05:21 +02:00
parent 6ffc5665d0
commit 1669c6bdb4
2 changed files with 11 additions and 19 deletions

View File

@@ -591,26 +591,18 @@ def __setMetasploit():
if not conf.msfPath:
def _(key, value):
retVal = None
try:
from _winreg import ConnectRegistry, OpenKey, QueryValueEx, HKEY_LOCAL_MACHINE
_ = ConnectRegistry(None, HKEY_LOCAL_MACHINE)
_ = OpenKey(_, key)
retval = QueryValueEx(_, value)[0]
except:
pass
retVal = QueryValueEx(_, value)[0]
except Exception, ex:
print ex
return retVal
conf.msfPath = _(r"SOFTWARE\Rapid7\Metasploit", "Location")
warnMsg = "some sqlmap takeover functionalities are not yet "
warnMsg += "supported on Windows. Please use Linux in a virtual "
warnMsg += "machine for out-of-band features."
logger.critical(warnMsg)
raise sqlmapSilentQuitException
if conf.msfPath:
conf.msfPath = os.path.join(conf.msfPath, "msf3")
if conf.osSmb:
isAdmin = runningAsAdmin()