Closed bcook-r7 closed 9 years ago
Test PASSED. Refer to this link for build results (access rights to CI server needed): https://ci.metasploit.com//job/GPR-MeterpreterWin/141/ Test PASSED.
Processing shortly!
msf exploit(handler) > run
[*] Started reverse handler on 10.1.10.40:8000
[*] Starting the payload handler...
[*] Sending stage (770048 bytes) to 10.1.10.42
[*] Meterpreter session 18 opened (10.1.10.40:8000 -> 10.1.10.42:59130) at 2015-01-28 15:08:54 +1000
meterpreter > sysinfo
Computer : WIN-S45GUQ5KGVK
OS : Windows 7 (Build 7601, Service Pack 1).
Architecture : x64 (Current Process is WOW64)
System Language : en_US
Meterpreter : x86/win32
meterpreter > upload /tmp/empty C:\\temp\\
[*] uploading : /tmp/empty -> C:\temp\
[-] core_channel_write: Operation failed: The parameter is incorrect.
Broken!
msf exploit(handler) > run
[*] Started reverse handler on 10.1.10.40:8000
[*] Starting the payload handler...
[*] Sending stage (972288 bytes) to 10.1.10.42
[*] Meterpreter session 19 opened (10.1.10.40:8000 -> 10.1.10.42:59134) at 2015-01-28 15:11:35 +1000
meterpreter > sysinfo
Computer : WIN-S45GUQ5KGVK
OS : Windows 7 (Build 7601, Service Pack 1).
Architecture : x64
System Language : en_US
Meterpreter : x64/win64
meterpreter > upload /tmp/empty C:\\temp\\
[*] uploading : /tmp/empty -> C:\temp\
[-] core_channel_write: Operation failed: The parameter is incorrect.
Broken
msf exploit(handler) > run
[*] Started reverse handler on 10.1.10.40:8000
[*] Starting the payload handler...
[*] Transmitting intermediate stager for over-sized stage...(100 bytes)
[*] Sending stage (1142784 bytes) to 10.1.10.40
[*] Meterpreter session 20 opened (10.1.10.40:8000 -> 10.1.10.40:54001) at 2015-01-28 15:13:20 +1000
meterpreter > sysinfo
Computer : ropchain
OS : Linux ropchain 3.14.23-100.fc19.x86_64 #1 SMP Thu Oct 30 18:36:00 UTC 2014 (x86_64)
Architecture : x86_64
Meterpreter : x86/linux
meterpreter > upload /tmp/empty /home/oj/empty
[*] uploading : /tmp/empty -> /home/oj/empty
[*] uploaded : /tmp/empty -> /home/oj/empty
working
msf exploit(handler) > run
[*] Started reverse handler on 10.1.10.40:8000
[*] Starting the payload handler...
[*] Sending stage (770048 bytes) to 10.1.10.42
[*] Meterpreter session 21 opened (10.1.10.40:8000 -> 10.1.10.42:59251) at 2015-01-28 19:41:56 +1000
meterpreter > sysinfo
Computer : WIN-S45GUQ5KGVK
OS : Windows 7 (Build 7601, Service Pack 1).
Architecture : x64 (Current Process is WOW64)
System Language : en_US
Meterpreter : x86/win32
meterpreter > upload /tmp/empty C:\\temp\\
[*] uploading : /tmp/empty -> C:\temp\
[*] uploaded : /tmp/empty -> C:\temp\\empty
Working!
msf exploit(handler) > run
[*] Started reverse handler on 10.1.10.40:8000
[*] Starting the payload handler...
[*] Sending stage (972288 bytes) to 10.1.10.42
[*] Meterpreter session 22 opened (10.1.10.40:8000 -> 10.1.10.42:59252) at 2015-01-28 19:43:10 +1000
meterpreter > sysinfo
Computer : WIN-S45GUQ5KGVK
OS : Windows 7 (Build 7601, Service Pack 1).
Architecture : x64
System Language : en_US
Meterpreter : x64/win64
meterpreter > upload /tmp/empty C:\\temp\\
[*] uploading : /tmp/empty -> C:\temp\
[*] uploaded : /tmp/empty -> C:\temp\\empty
Working!
msf exploit(handler) > run
[*] Started reverse handler on 10.1.10.40:8000
[*] Starting the payload handler...
[*] Transmitting intermediate stager for over-sized stage...(100 bytes)
[*] Sending stage (1241088 bytes) to 10.1.10.40
[*] Meterpreter session 23 opened (10.1.10.40:8000 -> 10.1.10.40:55237) at 2015-01-28 19:46:41 +1000
meterpreter > sysinfo
Computer : ropchain
OS : Linux ropchain 3.14.23-100.fc19.x86_64 #1 SMP Thu Oct 30 18:36:00 UTC 2014 (x86_64)
Architecture : x86_64
Meterpreter : x86/linux
meterpreter > upload /tmp/empty /home/oj/empty
[*] uploading : /tmp/empty -> /home/oj/empty
[*] uploaded : /tmp/empty -> /home/oj/empty
Still working.
Looks good to me. Landing.
Is it worth doing another build and release of the binaries at this point? Or should we wait for more stuff ?
Let's wait a little while - working on more stuff in the mean time.
When writing to a file channel, it is possible to open a file and have an implicit '0' byte write. For instance, when opening an empty file open, like so:
or 'touching' a file as in write_file("meterpreter-test", "") in test/modules/post/test/file.rb or uploading a zero-length file.
Steps to reproduce/verify
Before:
After: