diff --git a/src/core/shells/bind_tcp.py b/src/core/shells/bind_tcp.py index 4441072970..bd1c622c4a 100755 --- a/src/core/shells/bind_tcp.py +++ b/src/core/shells/bind_tcp.py @@ -71,7 +71,7 @@ def netcat_version(separator): return checks.shell_options(nc_version) # Invalid command else: - checks.invalid_option(nc_version) + common.invalid_option(nc_version) continue nc_alternative, shell = checks.use_bin_subdir(nc_alternative, shell) @@ -291,7 +291,7 @@ def other_bind_shells(separator): return checks.shell_options(other_shell) # Invalid option else: - checks.invalid_option(other_shell) + common.invalid_option(other_shell) continue return other_shell @@ -332,7 +332,7 @@ def bind_tcp_options(separator): return checks.shell_options(bind_tcp_option) # Invalid option else: - checks.invalid_option(bind_tcp_option) + common.invalid_option(bind_tcp_option) continue return bind_tcp_option @@ -386,10 +386,10 @@ def configure_bind_tcp(separator): else: continue else: - checks.invalid_option(option) + common.invalid_option(option) pass else: - checks.invalid_option(option) + common.invalid_option(option) pass # eof \ No newline at end of file diff --git a/src/core/shells/reverse_tcp.py b/src/core/shells/reverse_tcp.py index 0dce4bd1bf..e901ee2a6f 100755 --- a/src/core/shells/reverse_tcp.py +++ b/src/core/shells/reverse_tcp.py @@ -76,7 +76,7 @@ def netcat_version(separator): return checks.shell_options(nc_version) # Invalid option else: - checks.invalid_option(nc_version) + common.invalid_option(nc_version) continue nc_alternative, shell = checks.use_bin_subdir(nc_alternative, shell) @@ -315,7 +315,7 @@ def other_reverse_shells(separator): elif windows_reverse_shell == '2' : output = "powershell_attack.txt" else: - checks.invalid_option(windows_reverse_shell) + common.invalid_option(windows_reverse_shell) continue if not os.path.exists(settings.METASPLOIT_PATH): @@ -412,7 +412,7 @@ def other_reverse_shells(separator): elif web_delivery == '3': payload = "windows/meterpreter/reverse_tcp" else: - checks.invalid_option(web_delivery) + common.invalid_option(web_delivery) continue if not os.path.exists(settings.METASPLOIT_PATH): @@ -467,7 +467,7 @@ def other_reverse_shells(separator): return checks.shell_options(other_shell) # Invalid option else: - checks.invalid_option(other_shell) + common.invalid_option(other_shell) continue return other_shell @@ -509,7 +509,7 @@ def reverse_tcp_options(separator): return checks.shell_options(reverse_tcp_option) # Invalid option else: - checks.invalid_option(reverse_tcp_option) + common.invalid_option(reverse_tcp_option) continue return reverse_tcp_option @@ -567,10 +567,10 @@ def configure_reverse_tcp(separator): elif option[4:12].lower() == "uripath ": checks.check_uripath(option[12:]) else: - checks.invalid_option(option) + common.invalid_option(option) pass else: - checks.invalid_option(option) + common.invalid_option(option) pass # eof \ No newline at end of file diff --git a/src/utils/settings.py b/src/utils/settings.py index 11e3f04d2d..bbf8bc1eb0 100755 --- a/src/utils/settings.py +++ b/src/utils/settings.py @@ -262,7 +262,7 @@ def sys_argv_errors(): DESCRIPTION = "The command injection exploiter" AUTHOR = "Anastasios Stasinopoulos" VERSION_NUM = "4.0" -REVISION = "94" +REVISION = "95" STABLE_RELEASE = False VERSION = "v" if STABLE_RELEASE: