Metasploit mailing list archives
upexec gets error "This program cannot be run in DOS mode"
From: kevin at kindsight.net (Kevin McNamee)
Date: Tue, 8 Sep 2009 17:10:46 -0400
I am a new Metasploit user and have been experimenting with the upexec payload. The target is an XP SP3 system with a vulnerable version of netcat installed. I run the "netcat110_nt" exploit with the payload set to "windows/upexec/reverse_nonx_tcp". The exploit works, the payload is delivered, the file is uploaded and executed, but all I see coming back from the uploaded application on port 4444 is the message "This program cannot be run in DOS mode". The application was built as a windows console app. On the console it looks like everything works... 16:30:22 - netcat110_nt [*] Launching exploit windows/misc/netcat110_nt... 16:30:22 - netcat110_nt [*] Started reverse handler 16:30:23 - netcat110_nt [*] Sending stage (396 bytes) 16:30:23 - netcat110_nt [*] Sleeping before handling stage... 16:30:24 - netcat110_nt [*] Uploading executable (39351 bytes)... 16:30:25 - netcat110_nt [*] Executing uploaded file... 16:30:25 - [*] Session 1 created for 192.168.0.2:1038 Any advice on how to fix this or on what debugging steps to take next would be greatly appreciated. km. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090908/431ef3ee/attachment.html>
Current thread:
- upexec gets error "This program cannot be run in DOS mode" Kevin McNamee (Sep 08)
- upexec gets error "This program cannot be run in DOS mode" HD Moore (Sep 08)