Metasploit mailing list archives
another payload execution failure
From: security at vahle.de (Thomas Werth)
Date: Thu, 12 Jun 2008 08:58:37 +0200
thx for the information. Anyway payload terminates program and doesn't write test2 to c:\test.txt. mmiller at hick.org schrieb:
On Thu, Jun 12, 2008 at 07:41:30AM +0200, Thomas Werth wrote:Yes that's the way i typed it in. This is then shown as CMD echo test2 > c:\test.txt when using show options.msfconsole acts like a normal command shell. If you want the quotes to be included in the string, you need to escape them: msf exploit(aggressive) > set CMD \"echo test2 > c:\\test.txt\" CMD => "echo test2 > c:\test.txt" ... Name Value ---- ----- CMD "echo test2 > c:\test.txt"
Current thread:
- MSF and Windows SP3 (solved), (continued)
- MSF and Windows SP3 (solved) mmiller at hick.org (Jun 04)
- MSF and Windows SP3 (solved) Thomas Werth (Jun 04)
- MSF and Windows SP3 (solved) mmiller at hick.org (Jun 05)
- MSF and Windows SP3 (solved) Thomas Werth (Jun 05)
- another payload execution failure Thomas Werth (Jun 11)
- another payload execution failure H D Moore (Jun 11)
- another payload execution failure Thomas Werth (Jun 11)
- another payload execution failure Patrick Webster (Jun 11)
- Message not available
- another payload execution failure Thomas Werth (Jun 11)
- another payload execution failure mmiller at hick.org (Jun 11)
- another payload execution failure Thomas Werth (Jun 11)
- another payload execution failure H D Moore (Jun 12)
- another payload execution failure Thomas Werth (Jun 12)
- another payload execution failure H D Moore (Jun 12)