Files
metasploit-gs/lib/msf/base/sessions/mysql.rb
T
2024-04-09 13:38:07 +01:00

42 lines
923 B
Ruby

# -*- coding: binary -*-
require 'rex/post/mysql'
class Msf::Sessions::MySQL < Msf::Sessions::Sql
# @param[Rex::IO::Stream] rstream
# @param [Hash] opts
def initialize(rstream, opts = {})
@client = opts.fetch(:client)
self.platform = opts.fetch(:platform)
self.arch = opts.fetch(:arch)
self.console = ::Rex::Post::MySQL::Ui::Console.new(self)
super(rstream, opts)
end
# @param [Hash] datastore
# @param [nil] handler
# @return [String]
def bootstrap(datastore = {}, handler = nil)
session = self
session.init_ui(user_input, user_output)
@info = "MySQL #{datastore['USERNAME']} @ #{client.peerinfo}"
end
# @return [String] The type of the session
def self.type
'mysql'
end
# @return [Boolean] Can the session clean up after itself
def self.can_cleanup_files
false
end
# @return [String] The session description
def desc
'MySQL'
end
end