-
**Describe the bug**
The `mssql_priv` module is not providing accurate sysadmin detection and is falsely claiming to have performed escalation.
**To Reproduce**
Broken `netexec` behavior:
``…
smcgu updated
4 months ago
-
### Background
Some modules / exploits define the preferred payload in their 'default_options', example:
[https://github.com/rapid7/metasploit-framework/commit/2b90d33aefe0b01d52bce71bfd85f266e430f0…
-
## Steps to reproduce
Install msf for windows
Run msfconsole from cmd
## Expected behavior
What should happen?
## Msf console runs
What happens instead?
Get the error : C:/MSF/metasploi…
-
## Steps to reproduce
```
msf6 payload(cmd/linux/https/x64/meterpreter/bind_tcp) > version
Framework: 6.3.55-dev-aec2a82af4
Console : 6.3.55-dev-aec2a82af4
msf6 > use payload/cmd/linux/https/x…
-
## Steps to reproduce
```
$ msfconsole
msf6 > use exploit/windows/http/gitstack_rce
[*] No payload configured, defaulting to windows/meterpreter/reverse_tcp
msf6 exploit(windows/http/gitstack…
znre updated
7 months ago
-
## Steps to reproduce
How'd you do it?
1. Install latest version of Metasploit (v6.3.55)
2. Use the log4shell_header_injection module
3. Set the lhost, srvhost, and rhost
4. Run the modul…
Cx01N updated
8 months ago
-
Hi
I wanted to use your tool to work with the .dat file, but I got an error:
Error: invalid format: dat
Framework Executable Formats [--format ]
===============================================…
-
I faced a weird error when using Armitage with msf6 to exploit the target.
Error while running command use: undefined method `prompting' for ##}, @subscribers_ref={}, @subscribers_idx=0, @pipe_input=…
-
Hey all,
I've installed MITMPROXY with the following commands
sudo apt-get install python3-pip python3-dev libtiff5-dev libjpeg8-dev libwebp-dev
sudo pip3 install mitmproxy
mitmproxy
cd ~/.…
-
## Steps to reproduce
How'd you do it?
1. vulner target from vulhub:
```
version: '2'
services:
sshd:
image: vulhub/libssh:0.8.1
ports:
- "3222:22"
```
2. reproduce with msfc…