Adjusted retries in metasploit

pull/6/head
Thorsten Sick 3 years ago
parent a9226eab1f
commit c190bcf090

@ -122,18 +122,17 @@ class Metasploit():
# print(f"Session ID: {session_id}") # print(f"Session ID: {session_id}")
shell = self.client.sessions.session(session_id) shell = self.client.sessions.session(session_id)
res = [] res = []
time.sleep(1) time.sleep(1) # To ensure an active session
for cmd in cmds: for cmd in cmds:
shell.write(cmd) shell.write(cmd)
time.sleep(delay) time.sleep(delay)
retries = 10 retries = 20
r = ""
while retries > 0: while retries > 0:
r = shell.read() r += shell.read()
time.sleep(0.5) # Command needs time to execute time.sleep(0.5) # Command needs time to execute
retries -= 1 retries -= 1
if len(r) > 0: res.append(r)
res.append(r)
break
return res return res
@ -242,7 +241,6 @@ class MSFVenom():
if self.attack_logger: if self.attack_logger:
self.attack_logger.stop_file_write("", self.target.get_name(), payload_name) self.attack_logger.stop_file_write("", self.target.get_name(), payload_name)
# TODO run on target
if self.target.get_os() == "linux": if self.target.get_os() == "linux":
if self.target.get_playground() is not None: if self.target.get_playground() is not None:
cmd = f"cd {self.target.get_playground()};" cmd = f"cd {self.target.get_playground()};"

Loading…
Cancel
Save