trustedsec / social-engineer-toolkit

The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
10.69k stars 2.73k forks source link

Bug in Powershell Direct Shellcode Teensy Attack #44

Closed azsde closed 10 years ago

azsde commented 10 years ago

Hi,

I'm trying to use this option in order to test the security of my computers but I cannot get this option to work, all I have is this message :


set:arduino>12 [*] Generating the Powershell - Shellcode injection pde..

The powershell - shellcode injection leverages powershell to send a meterpreter session straight into memory without ever touching disk.

This technique was introduced by Matthew Graeber (http://www.exploit-monday.com/2011/10/exploiting-powershells-features-not.html)

[!] Something went wrong, printing the error: name 'setdir' is not defined


I've googled this a little bit and I can't find a solution, this problem wasn't here in the previous versions of SET.

Is this comming from me ? I'm running Kali Linux 1.0.5 and everything is up to date.

trustedsec commented 10 years ago

Thanks for the bug report. I've since fixed this and will be released in 5.4.5 (releasing it in a few minutes).

hink commented 10 years ago

Getting a different error now:

set:arduino>12
[*] Generating the Powershell - Shellcode injection pde..
The powershell - shellcode injection leverages powershell to send a meterpreter session straight into memory without ever touching disk.
This technique was introduced by Matthew Graeber (http://www.exploit-monday.com/2011/10/exploiting-powershells-features-not.html)
Enter the ipaddress for the reverse connection: 10.0.1.100
[*] Generating x86-based powershell injection code for port: 22
[*] Generating x86-based powershell injection code for port: 53
[*] Generating x86-based powershell injection code for port: 443
[*] Generating x86-based powershell injection code for port: 21
[*] Generating x86-based powershell injection code for port: 25
[*] Finished generating powershell injection bypass.
[*] Encoded to bypass execution restriction policy...
[!] Something went wrong, printing the error: name 'path' is not defined