Metasploit mailing list archives

Bugs in msfpayload


From: nicob at nicob.net (Nicob)
Date: Wed, 05 Sep 2007 20:15:52 +0200


This is a known bug that was fixed post 3.0 (use the latest svn update and 
it should not be a problem).

Tested again today on trunk 5086. Same results ...

As Patrick mentioned, you can use the "exec" payload and manually enter 
the command line you wish to run, including the group name.

OK. But imho, having it directly in windows/adduser would be fine.

You would need to run the "multi/handler" exploit from inside metasploit3 
to connect to the payload and perform the staging.

Doh ! I didn't understand how to use the "multi/handler" exploit :-(

Thanks for the quick answers,
Nicob




Current thread: