-
Notifications
You must be signed in to change notification settings - Fork 13.9k
-
Notifications
You must be signed in to change notification settings - Fork 13.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Whitelisting UUIDs for reverse_tcp_uuid handlers #5975
Comments
Updating the description to clarify that this should be for the |
This is similar to issue #5986 , or did I misinterpret it? |
@bcook-r7 A little different; SSL pinning is for whether Meterpreter trusts Metasploit, UUIDs are for whether Metasploit trusts a given Meterpreter (or stage). |
@hmoore-r7 Exactly as wrote. |
Hi! This issue has been left open with no activity for a while now. We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request. |
Thanks for your contribution to Metasploit Framework! We've looked at this issue, and unfortunately we do not currently have the bandwidth to prioritize this issue. We've labeled this as |
reverse_tcp's handlers doesn't contain IgnoreUnknownPayloads setting.
The text was updated successfully, but these errors were encountered: