diff --git a/monkey/infection_monkey/exploit/mssqlexec.py b/monkey/infection_monkey/exploit/mssqlexec.py index cb09c79fc..3dae07a21 100644 --- a/monkey/infection_monkey/exploit/mssqlexec.py +++ b/monkey/infection_monkey/exploit/mssqlexec.py @@ -107,12 +107,6 @@ class MSSQLExploiter(HostExploiter): mkdir_command = f"mkdir {MSSQLExploiter.TMP_DIR_PATH}" self._run_mssql_command(mkdir_command) - def run_mssql_command(self, mssql_command): - array_of_commands = mssql_command.split_into_array_of_smaller_payloads() - if not array_of_commands: - raise Exception("Couldn't execute MSSQL exploiter because payload was too long") - self.run_mssql_commands(array_of_commands) - def run_monkey(self, monkey_path_on_victim: PureWindowsPath): self._write_agent_launch_command_to_batch_file(monkey_path_on_victim) self.run_payload_file()