You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Don't know if I'm doing something wrong, but with the latest version of SET from the repositories running in an up to date Kali, if I configure the option "POWERSHELL_INJECTION" to "OFF" and then try to make a Java Applet attack with a "Windows Meterpreter Reverse HTTPS" payload, the "LHOST" option is not set:
[*] Processing /root/.set/meta_config for ERB directives.
resource (/root/.set/meta_config)> use exploit/multi/handler
resource (/root/.set/meta_config)> set PAYLOAD windows/meterpreter/reverse_https
PAYLOAD => windows/meterpreter/reverse_https
resource (/root/.set/meta_config)> set LHOST
[-] Unknown variable
Usage: set [option] [value]
As I can confirm in the file "~/.set/meta_config":
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_https
set LHOST
set EnableStageEncoding true
set ExitOnSession false
set LPORT 22
exploit -j
Everything works as expected if I turn the "POWERSHELL_INJECTION" on.
The text was updated successfully, but these errors were encountered:
Fixed in 5.3.6 - should be released here shortly - was caused when you didn't specify pyinjector or multipyinjector LHOST would be set to NULL. Thanks for the report.
Don't know if I'm doing something wrong, but with the latest version of SET from the repositories running in an up to date Kali, if I configure the option "POWERSHELL_INJECTION" to "OFF" and then try to make a Java Applet attack with a "Windows Meterpreter Reverse HTTPS" payload, the "LHOST" option is not set:
As I can confirm in the file "~/.set/meta_config":
Everything works as expected if I turn the "POWERSHELL_INJECTION" on.
The text was updated successfully, but these errors were encountered: