Metasploit mailing list archives

another payload execution failure


From: mmiller at hick.org (mmiller at hick.org)
Date: Wed, 11 Jun 2008 23:54:23 -0700

On Thu, Jun 12, 2008 at 07:41:30AM +0200, Thomas Werth wrote:
Yes that's the way i typed it in.
This is then shown as
CMD       echo test2 > c:\test.txt
when using show options.

msfconsole acts like a normal command shell.  If you want the quotes to
be included in the string, you need to escape them:

msf exploit(aggressive) > set CMD \"echo test2 > c:\\test.txt\"
CMD => "echo test2 > c:\test.txt"
...

  Name                    Value
  ----                    -----
  CMD                     "echo test2 > c:\test.txt"




Current thread: