diff --git a/monkey/infection_monkey/exploit/mssqlexec.py b/monkey/infection_monkey/exploit/mssqlexec.py index 3dae07a21..820c40228 100644 --- a/monkey/infection_monkey/exploit/mssqlexec.py +++ b/monkey/infection_monkey/exploit/mssqlexec.py @@ -115,12 +115,6 @@ class MSSQLExploiter(HostExploiter): agent_launch_command = self.get_monkey_launch_command(monkey_path_on_victim) self._write_command_to_batch_file(agent_launch_command) - def run_mssql_commands(self, cmds): - for cmd in cmds: - logger.debug(f"Running command on SQL Server: {cmd}") - self.cursor.execute(cmd) - sleep(MSSQLExploiter.QUERY_BUFFER) - def upload_monkey(self, monkey_path_on_victim: PureWindowsPath): self._write_download_command_to_batch_file(monkey_path_on_victim) self.run_payload_file() @@ -150,7 +144,6 @@ class MSSQLExploiter(HostExploiter): write_to_file_command = f"{self.payload_file_path}" self._run_mssql_command(write_to_file_command) - # Note: This is a strangler used to replace self.run_mssql_command() def _run_mssql_command(self, command: str): logger.debug(f"Running command on SQL Server: {command}")