-
Notifications
You must be signed in to change notification settings - Fork 13.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Meterpreter 'shell' no such command #9101
Comments
...or did I miss something?? Was this feature randomly removed? I cannot find any documentation leading to how one drops to shell via a meterpreter session. Is it broken, or is this a 'feature'? |
What Meterpreter are you using? |
I'm sorry, theres an option? How do I determine that? |
|
Maybe you meant which payload on the target? If so, its reverse tcp from an x86 linux host. Not sure if that's what youre asking |
It is. Thanks. |
Along with the sudden disappearance of the shell/sh/all other scripts, the session now endlessly drops and reconnects. This is just into a local virtual machine. |
Infuriatingly, a reboot and it works....? No idea why that would be. Sorry to clutter up the issues channel..thanks for all your coding awesomeness . msf > use exploit/multi/handler [] Started reverse TCP handler on 0.0.0.0:9999 meterpreter > shell |
Well, not entirely. Maybe somebody will shed some light on how to fix 'load -l' displaying exactly nothing. There's 66 scripts in scripts/meterpreter. What's gone wrong here? |
|
..is what i get. |
Right, those are extensions, not scripts. |
There are no 'extensions' for linux meterpreter currently - it is all bundled in with the base payload, so 'load -l' being empty is correct. @pbarry-r7 should have that PR up soon. |
Now, I'm not sure if tcp_uuid should work correctly - that needs some investigation. |
Thanks, I understand better now. |
thanks for actually knowing the answer to my question, random dude number two |
Random dude?
Neither of these legends are just random dudes mate. You're getting support
directly from the best.
…On Oct 23, 2017 08:17, "rocket-pig" ***@***.***> wrote:
thanks for actually knowing the answer to my question, random dude number
two
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#9101 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AABw4FLwR7JYVby-NGRyUc1TfVIrS1p3ks5su78HgaJpZM4QAMOs>
.
|
tl;dr It's potentially a regression, and rebooting is potentially just a coincidence. If that works for you, by all means continue doing it, but that doesn't resolve a systemic problem. Feel free to open a new ticket if you've determined that the UUID stagers are broken. Thanks for the report. |
It's working fine for me. Entirely possible it's an environmental problem. |
Steps to reproduce
Open a session, type 'shell': or 'load -l' ...nothing.
msf payload(reverse_tcp_uuid) > sessions -i 3
[*] Starting interaction with 3...
meterpreter > shell
[-] Unknown command: shell.
meterpreter > load -l
meterpreter >
System stuff
Metasploit version
e941677 Land #9100, typo fix for MS07-017 exploit
I installed Metasploit with:
ruby 2.3.3p222 (2016-11-21) [x86_64-linux-gnu]
I first had a apt-delivered install, and just did a source install hoping that this would fix it. Same, both ways.
OS
Ubuntu 7000
Ubuntu, the absolute latest.
The text was updated successfully, but these errors were encountered: