You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi. I used your code repo to generate the b64 payload and key strings and compiled the ProcessInjection.cs template using VS2019. The executable works fine with AV turned off and gets a meterpreter sesssion. When I try executing via the PS script (with AV off) I can see the .exe file being pulled down but no connection on metasploit.
1). Payload generated
2). PS commands ran on victim box
3). SimpleHTTP server showing the file being pulled down
I have also tried using IEX cradle to load the powershell script test.ps1 as shown in image 3 which behaves the same, i.e. file gets pulled down but no execution.
The text was updated successfully, but these errors were encountered:
However, I did notice some issues with the python script a few days ago. On a different project I needed a shellcode that didn't have any 0x00 characters so I amended the code. This seem to work fine, but I did notice that for a 'classic' shellcode shellcode injection scenario it didn't trigger MSF.
I have reverted the code back, download the python script and give it another go.
Hi. I used your code repo to generate the b64 payload and key strings and compiled the ProcessInjection.cs template using VS2019. The executable works fine with AV turned off and gets a meterpreter sesssion. When I try executing via the PS script (with AV off) I can see the .exe file being pulled down but no connection on metasploit.
1). Payload generated
2). PS commands ran on victim box
3). SimpleHTTP server showing the file being pulled down
I have also tried using IEX cradle to load the powershell script test.ps1 as shown in image 3 which behaves the same, i.e. file gets pulled down but no execution.
The text was updated successfully, but these errors were encountered: