Closed kl0101 closed 4 years ago
Did you have copy the shellcode from venom terminal to exec.py file and then saved the file?
Does your wine its configurated to use the same target arch ?? example: if your target its windows10 then set wine to windows10 .. . also: why are you using an old payload ?? that build its flagged by most anti-virus solluctions, because they have a signature of that build in there databases ..(its a waste of time) ..
here are the new payloads: https://github.com/r00t-3xp10it/venom/releases/tag/v1.0.16
The window does not open to copy / paste the code. here is the error I get when I launch the payload with wine. It is not important to me it is not fud
Interesting, i have wine installed, but i have never had the idea to open the payload with it, why not just open the payload in the context of windows 10 and see if there is a difference?
Intéressant, j'ai du vin installé, mais je n'ai jamais eu l'idée d'ouvrir la charge utile avec, pourquoi ne pas simplement ouvrir la charge utile dans le contexte de Windows 10 et voir s'il y a une différence?
@codings9 Agent 3 works for you?
Indeed in the new version of Kali leafpad is not installed, I just did a new test by adding the code, I still have an error. I did a test with win7 and 10
I managed to make the payload work with wine but not on a vm windows 10
Well it seems that its a PYTHON LIBS related issue under Windows10 .. <-- maybee ctypes * API call forget about this build ..because its flaged by most AV solluctions ..
Use the new payloads (3) of [ amsi evasion ] categorie insted .. https://github.com/r00t-3xp10it/venom/releases/tag/v1.0.16
agent 3 windows does not work. I have no feedback on the metasploit console.