Skip to content
This repository has been archived by the owner on Jan 10, 2024. It is now read-only.

CS payloados dosn't work on metasploit 5.0.37 #312

Open
Dark888 opened this issue Jul 21, 2019 · 3 comments
Open

CS payloados dosn't work on metasploit 5.0.37 #312

Dark888 opened this issue Jul 21, 2019 · 3 comments

Comments

@Dark888
Copy link

Dark888 commented Jul 21, 2019

Veil version

3.1.12

OS Used - all info (architecture, linux flavor, etc)

kali 2019
metasploit 5.0.37

How did you install Veil? (Apt, Clone from Github, etc.)

apt

Did you run the setup script?

no

Pastebin link to error you are encountering (include console actions you took prior to error)

use 9 OR 10 OR 11
set LHOST metasploitIP
set LPORT 4444

Expected behavior

Session open, but don't open any session!
I think it works last mount ago.

Any additional info you want to tell me

@ChrisTruncer
Copy link
Member

Can you please provide more information and let me know the type of handlers you are using, the type of meterpreter payload, etc.?

@Dark888
Copy link
Author

Dark888 commented Aug 3, 2019

I use it:
Handler -H 0.0.0.0 -P 443 -p windows/x64/meterpreter/reverse_http
for HTTPS
Handler -H 0.0.0.0 -P 443 -p windows/x64/meterpreter/reverse_https

@Pouya47
Copy link

Pouya47 commented Aug 4, 2019

The source of reverse_http problem is "Payload UUID"!
In the rev_http.py generated UUID for HTTP GET request is not in correct format (Payload UUID format ) and metasploit listener don't answer to incorrect Payload UUID.
The quick fix is capture a correct Payload UUID and use it in C# source code.
The complete fix is rewrite generate UUID method in C#!
I work on it but I get error when copy time into 4Byte array :(

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants