Metasploit-framework: Default Meterpreter prompt corrupted

Created on 22 Oct 2019  路  6Comments  路  Source: rapid7/metasploit-framework

When I got a linux/x64/meterpreter/reverse_tcp session, the prompt looked like this:

wvundmeterpreter >

I suspect that the %u username substitution is operating on the %u in the %undmeterpreter%clr default prompt.

12438

bug confirmed library

All 6 comments

@zeroSteiner

You beat me to it by a drive in the car.
android/meterpreter_reverse_tcp on Kali is giving me rootndmeterpreter

@bwatters-r7 confirms the same behavior.

I'm on it

Same on Windows:

msf5 exploit(multi/handler) > sessions

Active sessions
===============

  Id  Name  Type                     Information               Connection
  --  ----  ----                     -----------               ----------
  1         meterpreter x64/windows  FAILTRAIN\oj @ FAILTRAIN  192.168.146.129:4444 -> 192.168.146.130:52694 (192.168.146.130)

msf5 exploit(multi/handler) > sessions -1
[*] Starting interaction with 1...

ojndmeterpreter > 

Whew, I thought this was something on just my machine. Y'all are awesome! :heart:

Was this page helpful?
0 / 5 - 0 ratings

Related issues

Sonya2010 picture Sonya2010  路  3Comments

Acidical picture Acidical  路  3Comments

XSecr3t picture XSecr3t  路  3Comments

notdodo picture notdodo  路  3Comments

wvu-r7 picture wvu-r7  路  3Comments