Metasploit mailing list archives
Bugs in msfpayload
From: nicob at nicob.net (Nicob)
Date: Wed, 05 Sep 2007 20:15:52 +0200
This is a known bug that was fixed post 3.0 (use the latest svn update and it should not be a problem).
Tested again today on trunk 5086. Same results ...
As Patrick mentioned, you can use the "exec" payload and manually enter the command line you wish to run, including the group name.
OK. But imho, having it directly in windows/adduser would be fine.
You would need to run the "multi/handler" exploit from inside metasploit3 to connect to the payload and perform the staging.
Doh ! I didn't understand how to use the "multi/handler" exploit :-( Thanks for the quick answers, Nicob
Current thread:
- Bugs in msfpayload Nicob (Sep 04)
- Bugs in msfpayload Patrick Webster (Sep 05)
- Bugs in msfpayload H D Moore (Sep 05)
- Bugs in msfpayload Nicob (Sep 05)