-
-
Notifications
You must be signed in to change notification settings - Fork 6k
Closed
Description
Running version: 1.3.12.29#dev
Python version: 2.7.16
Operating system: Windows-10-10.0.17763
Command line: sqlmap.py -r **************************************** -p LoginName --threads 7 --level=3 --risk=3 --random-agent --technique=BS --tamper=charunicodeencode --drop-set-cookie --dbs --os-pwn --msf-path C:\metasploit v 2 --no-cast --batch
Technique: STACKED
Back-end DBMS: Microsoft SQL Server (fingerprinted)
Traceback (most recent call last):
File "sqlmap.py", line 212, in main
start()
File "lib/core/decorators.py", line 75, in _
result = f(*args, **kwargs)
File "lib/controller/controller.py", line 687, in start
action()
File "lib/controller/action.py", line 222, in action
conf.dbmsHandler.osPwn()
File "plugins/generic/takeover.py", line 210, in osPwn
setupSuccess = self.uploadShellcodeexec(web=web)
File "lib/takeover/metasploit.py", line 654, in uploadShellcodeexec
written = self.writeFile(self.shellcodeexecLocal, self.shellcodeexecRemote, "binary", forceCheck=True)
File "plugins/generic/filesystem.py", line 302, in writeFile
written = self.stackedWriteFile(localFile, remoteFile, fileType, forceCheck)
File "plugins/dbms/mssqlserver/filesystem.py", line 392, in stackedWriteFile
with open(localFile, "rb") as f:
IOError: [Errno 13] Permission denied: u'c:\\users\\********\\appdata\\local\\temp\\sqlmapqjabcs9244\\tmpxyyv5832erixh8.exe'