Metasploit mailing list archives

console with arguments


From: jerome.athias at free.fr (Jerome Athias)
Date: Fri, 04 May 2007 22:07:14 +0200

Thanks HD (i didn't reported it as bug as it's just a 'new option')

For Bill:
you should also take in consideration the

window.parent.openConsoleWindowExploit(cid) JavaScript function
See:
application.js

And look in the source of the page to correctly set the URL parameters:
&eopt_RHOST=
&eopt_RPORT=
...


Btw, it seems tricky out of the context, even with use of an XSS :p
http://127.0.0.1:55555/exploits/config?refname=windows%3Ahttp%3Anavicopa_get_overflow&payload=16&step=config&target=0&eopt_RHOST=127.0.0.1&eopt_RPORT=80&popt_CMD=calc.exe&eopt_CHOST=";<script>openConsoleWindowExploit(0);</script>

/JA

H D Moore a ?crit :
I will file a bug for this that allows either a name or id to be passed.



Current thread: