trustedsec / meterssh

MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.
519 stars 184 forks source link

Ctypes Error #8

Open rschwass opened 7 years ago

rschwass commented 7 years ago

When Using python3 I get the following Error.

image

Traceback (most recent call last): File "c:\meterssh\meterssh_og.py", line 48, in inject ctypes.c_int(len(shellcode))) ctypes.ArgumentError: argument 1: <class 'TypeError'>: wrong type

ryman1 commented 7 years ago

This issue seemed unavoidable no matter which versions of python3/windows I tried. I think I have fixed the issue in PR https://github.com/trustedsec/meterssh/pull/9 . Reverse Meterpreter sessions work now.