Skip to content
This repository has been archived by the owner on Nov 6, 2023. It is now read-only.

Request for help (and maybe documentation?) #75

Open
harrihaven2 opened this issue Apr 21, 2020 · 1 comment
Open

Request for help (and maybe documentation?) #75

harrihaven2 opened this issue Apr 21, 2020 · 1 comment

Comments

@harrihaven2
Copy link

Hey there!

This is a really amazing project that has some unique features I haven't seen anywhere else and I'm really appreciative of the work I see that has been put into this!

I'm having trouble with specifying custom shellcode on the command line, and I can't find any examples or documentation regarding it.

What I've tried:

  1. Using the "-cp" flag followed by a hex byte string delimited by slashes (i.e. "0xfc\0xe8\0x82")
  2. Using the "-cp" flag followed by the relative path to the file with the hex byte string on a single line.
  3. Using the "-cp" flag followed by the absolute path to the file with the hex byte string on a single line.
  4. Using the "-cp" flag followed by a hex byte string delimited by commas.

Any guidance would be much appreciated!

@harrihaven2
Copy link
Author

I forgot to add the error message I get!

[ERROR] Msfvenom shellcode options require Host (-H) and Port (-P) arguments

Traceback (most recent call last):
File "phantom-evasion.py", line 396, in
Phantom_lib.CmdlineLauncher(sys.argv)
File "Setup/Phantom_lib.py", line 1114, in CmdlineLauncher
if "reverse" in args.msfvenom:
TypeError: argument of type 'NoneType' is not iterable

I'm not specifying a msfvenom command, and that seems to be the problem. But I'm specifying
a "-cp" flag and it looks like in lines 990-992 that they are mutually excluding parameters. Where am I going wrong?

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant