You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
(EDIT: Targeting a Win10 x64 SP1 fully patched VM with a meterpreter/x64/bind_tcp payload)
Immediately after my Meterpreter payload uploaded, I set up a route. Although I got an error, the route existed in msfconsole's routing table, but it couldn't be deleted:
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here.
If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
dwelch-r7
added
confirmed
Issues confirmed by a committer
and removed
Stale
Marks an issue as stale, to be closed if no action is taken
labels
Dec 2, 2020
@mubix recently ran into this in the msf slack channel, so looks like this is still an issue. Not sure on replication steps, but we should at least reduce the raise exception here to a warning:
Steps to reproduce
(EDIT: Targeting a Win10 x64 SP1 fully patched VM with a
meterpreter/x64/bind_tcp
payload)Immediately after my Meterpreter payload uploaded, I set up a route. Although I got an error, the route existed in msfconsole's routing table, but it couldn't be deleted:
So I re-ran the command:
But now I can't delete the route:
Expected behavior
We should wait until the payload is fully ready or, at a minimum, not update the local routing table to keep them in sync.
[ wait three minutes -- just to be really, really sure ]
Current behavior
In addition to the above error,
~/.msf4/logs/framework.log
shows:System stuff
Metasploit version
Fully up-to-date with rapid7/metasploit-framework:master
I installed Metasploit with:
ruby 2.5.1p57 (2018-03-29 revision 63029)
OS
What OS are you running Metasploit on? Parrot Linux 4.1 (fully patched)
The text was updated successfully, but these errors were encountered: