Пример #1
0
from src.payloads.powershell.prep import prep_powershell_payload

#from src.core.payloadgen import create_payloads

# Py2/3 compatibility
# Python3 renamed raw_input to input
try:
    input = raw_input
except NameError:
    pass

#
# this is the mssql modules
#
# define the base path
definepath = core.definepath()
operating_system = core.check_os()
msf_path = core.meta_path()


#
# this is the brute forcer
#
def brute(ipaddr, username, port, wordlist):
    # if ipaddr being passed is invalid
    if ipaddr == "":
        return False

    if ":" in ipaddr:
        ipaddr = ipaddr.split(":")
        ipaddr, port = ipaddr
Пример #2
0
import impacket.tds as tds

#from src.core.payloadgen import create_payloads

# Py2/3 compatibility
# Python3 renamed raw_input to input
try:
    input = raw_input
except NameError:
    pass

#
# this is the mssql modules
#
# define the base path
definepath = core.definepath()
operating_system = core.check_os()
msf_path = core.meta_path()


#
# this is the brute forcer
#
def brute(ipaddr, username, port, wordlist):
    # if ipaddr being passed is invalid
    if ipaddr == "":
        return False

    if ":" in ipaddr:
        ipaddr = ipaddr.split(":")
        ipaddr, port = ipaddr