rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
34.09k stars 13.96k forks source link

Feature request: handle ^D (EOF) in interactive command shells #11772

Open wvu opened 5 years ago

wvu commented 5 years ago
msf5 exploit(linux/telnet/netgear_telnetenable) > sessions -1
[*] Starting interaction with 2...

# cat
cat
hello, world
hello, world
hello, world
^D

^C
Abort session 2? [y/N]

[*] Aborting foreground process in the shell session
^C
# cat <<EOF
cat <<EOF
> hello, world
hello, world
> EOF
EOF
hello, world
#

10448, #10450

themrrobert commented 4 years ago

I, too, believe this would be useful. Was not able to send EOF using any of the methods I could think of: (Ctrl+D || Ctrl+V,Ctrl+D || Ins,Ctrl+D || Ins,Ctrl+V,Ctrl+D)

meterpreter > execute -i -f php
Process 2865 created.
Channel 5 created.
<?php
echo "Hello\n";
?>

^D
^[[2~
^[[2~^D
rmhowe425 commented 1 year ago

@wvu Is this issue up for grabs? If so I'll take it

wvu commented 1 year ago

No idea. I haven't worked on Metasploit in over a year. @adfoster-r7

adfoster-r7 commented 1 year ago

I haven't worked on Metasploit in over a year

... 😢

adfoster-r7 commented 1 year ago

@rmhowe425 Pull requests are always welcome 🎉