Metasploit mailing list archives
unable to reproduce WMF exploit
From: hdm at metasploit.com (H D Moore)
Date: Thu, 12 Jan 2006 08:46:16 -0600
The call to CreateProcess() inside the win32_exec payload hides the window by default. The simple way to avoid this is to set CMD to the string: "cmd.exe /c start <cmd name>" -HD On Thursday 12 January 2006 02:03, Michael Wood wrote:
Is there anything special that needs to be done to get the win32_exec payload to actually display the process it is running? :)
Current thread:
- unable to reproduce WMF exploit /dev/null (Jan 10)
- unable to reproduce WMF exploit Devin Ertel (Jan 10)
- unable to reproduce WMF exploit H D Moore (Jan 10)
- unable to reproduce WMF exploit Michael Wood (Jan 12)
- unable to reproduce WMF exploit H D Moore (Jan 12)
- <Possible follow-ups>
- unable to reproduce WMF exploit /dev/null (Jan 10)