Metasploit mailing list archives
another payload execution failure
From: mmiller at hick.org (mmiller at hick.org)
Date: Wed, 11 Jun 2008 23:54:23 -0700
On Thu, Jun 12, 2008 at 07:41:30AM +0200, Thomas Werth wrote:
Yes that's the way i typed it in. This is then shown as CMD echo test2 > c:\test.txt when using show options.
msfconsole acts like a normal command shell. If you want the quotes to be included in the string, you need to escape them: msf exploit(aggressive) > set CMD \"echo test2 > c:\\test.txt\" CMD => "echo test2 > c:\test.txt" ... Name Value ---- ----- CMD "echo test2 > c:\test.txt"
Current thread:
- MSF and Windows SP3 (solved), (continued)
- MSF and Windows SP3 (solved) H D Moore (Jun 04)
- MSF and Windows SP3 (solved) mmiller at hick.org (Jun 04)
- MSF and Windows SP3 (solved) Thomas Werth (Jun 04)
- MSF and Windows SP3 (solved) mmiller at hick.org (Jun 05)
- MSF and Windows SP3 (solved) Thomas Werth (Jun 05)
- another payload execution failure Thomas Werth (Jun 11)
- another payload execution failure H D Moore (Jun 11)
- another payload execution failure Thomas Werth (Jun 11)
- another payload execution failure Patrick Webster (Jun 11)
- Message not available
- another payload execution failure Thomas Werth (Jun 11)
- another payload execution failure mmiller at hick.org (Jun 11)
- another payload execution failure Thomas Werth (Jun 11)
- another payload execution failure H D Moore (Jun 12)
- another payload execution failure Thomas Werth (Jun 12)
- another payload execution failure H D Moore (Jun 12)