Files
metasploit-gs/lib/msf/base/sessions/mssql.rb
T
2024-02-21 18:01:55 +00:00

58 lines
1.0 KiB
Ruby

# -*- coding:binary -*-
require 'rex/post/mssql'
class Msf::Sessions::MSSQL < Msf::Sessions::Sql
# @return [String] The address MSSQL is running on
attr_accessor :address
# @return [Integer] The port MSSQL is running on
attr_accessor :port
attr_reader :framework
def initialize(rstream, opts = {})
@client = opts.fetch(:client)
self.console = ::Rex::Post::MSSQL::Ui::Console.new(self, opts)
super(rstream, opts)
end
def bootstrap(datastore = {}, handler = nil)
session = self
session.init_ui(user_input, user_output)
@info = "MSSQL #{datastore['USERNAME']} @ #{@peer_info}"
end
# Returns the type of session.
#
def self.type
'mssql'
end
def self.can_cleanup_files
false
end
#
# Returns the session description.
#
def desc
'MSSQL'
end
def address
return @address if @address
@address, @port = client.sock.peerinfo.split(':')
@address
end
def port
return @port if @port
@address, @port = client.sock.peerinfo.split(':')
@port
end
end