t3l3machus / hoaxshell

A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
BSD 2-Clause "Simplified" License
3.05k stars 482 forks source link

Crashes when changing directory #3

Closed pr0b3r7 closed 2 years ago

pr0b3r7 commented 2 years ago

Hi - good job on the FUD on win defender I'm having an issue where I'm not able to cd to any dir

image

The same issue occurs when opening calc.exe -

image

Stack trace shows hoaxshell > calc.exe----------------------------------------Exception occurred during processing of request from ('100.77.140.74', 50237)Traceback (most recent call last): File "/usr/lib/python3.10/socketserver.py", line 316, in _handle_request_noblock self.process_request(request, client_address) File "/usr/lib/python3.10/socketserver.py", line 347, in process_request self.finish_request(request, client_address) File "/usr/lib/python3.10/socketserver.py", line 360, in finish_request self.RequestHandlerClass(request, client_address, self) File "/usr/lib/python3.10/socketserver.py", line 747, in init self.handle() File "/usr/lib/python3.10/http/server.py", line 425, in handle self.handle_one_request() File "/usr/lib/python3.10/http/server.py", line 413, in handle_one_request method() File "/opt/hoaxshell/hoaxshell.py", line 306, in do_POST to_b_numbers = [ int(n) for n in bin_output ] File "/opt/hoaxshell/hoaxshell.py", line 306, in to_b_numbers = [ int(n) for n in bin_output ]ValueError: invalid literal for int() with base 10: '' doesn't seem to me it is the syntax either -

image
pr0b3r7 commented 2 years ago

This issue was fixed thanks to this PR https://github.com/t3l3machus/hoaxshell/pull/2 - pending approval from @t3l3machus to merge to main

t3l3machus commented 2 years ago

Hi, PR merged. It's weird that this issue came up, i thought i dealt with it at an earlier stage of development. Anyway, @brightio quick-fixed it. Thanks guys

brightio commented 2 years ago

Been there done that 🤣