Metasploit mailing list archives

upexec gets error "This program cannot be run in DOS mode"


From: kevin at kindsight.net (Kevin McNamee)
Date: Tue, 8 Sep 2009 17:10:46 -0400

I am a new Metasploit user and have been experimenting with the upexec
payload. The target is an XP SP3 system with a vulnerable version of
netcat installed. I run the "netcat110_nt" exploit with the payload set
to "windows/upexec/reverse_nonx_tcp". 

 

The exploit works, the payload is delivered, the file is uploaded and
executed, but all I see coming back from the uploaded application on
port 4444 is the message "This program cannot be run in DOS mode". The
application was built as a windows console app.   

 

On the console it looks like everything works...

 

16:30:22 - netcat110_nt [*] Launching exploit
windows/misc/netcat110_nt...    

16:30:22 - netcat110_nt [*] Started reverse handler

16:30:23 - netcat110_nt [*] Sending stage (396 bytes)   

16:30:23 - netcat110_nt [*] Sleeping before handling stage...    

16:30:24 - netcat110_nt [*] Uploading executable (39351 bytes)...    

16:30:25 - netcat110_nt [*] Executing uploaded file...    

16:30:25 - [*] Session 1 created for 192.168.0.2:1038    

 

Any advice on how to fix this or on what debugging steps to take next
would be greatly appreciated.

 

km.  

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090908/431ef3ee/attachment.html>


Current thread: