From d57f6f53f2a9cd9d9102d6a0034308f0849ed308 Mon Sep 17 00:00:00 2001 From: TrustedSec Date: Sat, 30 Jul 2016 19:46:35 -0400 Subject: [PATCH] fix typo --- src/fasttrack/mssql.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/fasttrack/mssql.py b/src/fasttrack/mssql.py index 4a9f15cee..0b06edab4 100644 --- a/src/fasttrack/mssql.py +++ b/src/fasttrack/mssql.py @@ -289,7 +289,7 @@ def deploy_hex2binary(ipaddr, port, username, password): child2 = pexpect.spawn("{0} -r {1}".format(os.path.join(msf_path + "msfconsole"), os.path.join(core.setdir + "reports/powershell/powershell.rc"))) core.print_status("Waiting for the listener to start first before we continue forward...") - core.print_status("Be patient, Metaploit takes a little bit to start...") + core.print_status("Be patient, Metasploit takes a little bit to start...") child2.expect("Starting the payload handler", timeout=30000) core.print_status("Metasploit started... Waiting a couple more seconds for listener to activate..") time.sleep(5)