fixing winscp module for python <= 3.8
parent
6a87589c55
commit
d0afcdc9b1
|
@ -7,6 +7,7 @@
|
||||||
# - https://github.com/rapid7/metasploit-framework/blob/master/lib/rex/parser/winscp.rb
|
# - https://github.com/rapid7/metasploit-framework/blob/master/lib/rex/parser/winscp.rb
|
||||||
|
|
||||||
import traceback
|
import traceback
|
||||||
|
from typing import Tuple
|
||||||
from impacket.dcerpc.v5.rpcrt import DCERPCException
|
from impacket.dcerpc.v5.rpcrt import DCERPCException
|
||||||
from impacket.dcerpc.v5 import rrp
|
from impacket.dcerpc.v5 import rrp
|
||||||
from impacket.examples.secretsdump import RemoteOperations
|
from impacket.examples.secretsdump import RemoteOperations
|
||||||
|
@ -105,7 +106,7 @@ class CMEModule:
|
||||||
clearpass = clearpass[len(key):]
|
clearpass = clearpass[len(key):]
|
||||||
return clearpass
|
return clearpass
|
||||||
|
|
||||||
def dec_next_char(self, passBytes) -> tuple[int, bytes]:
|
def dec_next_char(self, passBytes) -> "Tuple[int, bytes]":
|
||||||
"""
|
"""
|
||||||
Decrypts the first byte of the password and returns the decrypted byte and the remaining bytes.
|
Decrypts the first byte of the password and returns the decrypted byte and the remaining bytes.
|
||||||
Parameters
|
Parameters
|
||||||
|
|
Loading…
Reference in New Issue