Metasploit mailing list archives

another payload execution failure


From: hdm at metasploit.com (H D Moore)
Date: Thu, 12 Jun 2008 08:25:54 -0500

The command line needs to be:

"cmd /c echo test2 > c:\\test.txt"

-HD

On Thursday 12 June 2008, Thomas Werth wrote:
Program is running on a winXP Prof with SP3 .
Well WinExec is processed but cmd isn't executed.
I have
CMD       echo test2 > c:\test.txt
as command, but there is no file created.

I've created small perl poc, which contains infinitve loop via
$attackstring .= "\xeb\xfe";
This one is correct processed and program loops forever.
So i guess problem indeed seems to be closy related to payloads...



Current thread: