diff --git a/cme/modules/winscp_dump.py b/cme/modules/winscp_dump.py index c3ee8e9a..b29cca8b 100644 --- a/cme/modules/winscp_dump.py +++ b/cme/modules/winscp_dump.py @@ -7,6 +7,7 @@ # - https://github.com/rapid7/metasploit-framework/blob/master/lib/rex/parser/winscp.rb import traceback +from typing import Tuple from impacket.dcerpc.v5.rpcrt import DCERPCException from impacket.dcerpc.v5 import rrp from impacket.examples.secretsdump import RemoteOperations @@ -105,7 +106,7 @@ class CMEModule: clearpass = clearpass[len(key):] return clearpass - def dec_next_char(self, passBytes) -> tuple[int, bytes]: + def dec_next_char(self, passBytes) -> "Tuple[int, bytes]": """ Decrypts the first byte of the password and returns the decrypted byte and the remaining bytes. Parameters