When I got a linux/x64/meterpreter/reverse_tcp session, the prompt looked like this:
wvundmeterpreter >
I suspect that the %u username substitution is operating on the %u in the %undmeterpreter%clr default prompt.
@zeroSteiner
You beat me to it by a drive in the car.
android/meterpreter_reverse_tcp on Kali is giving me rootndmeterpreter
@bwatters-r7 confirms the same behavior.
I'm on it
Same on Windows:
msf5 exploit(multi/handler) > sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x64/windows FAILTRAIN\oj @ FAILTRAIN 192.168.146.129:4444 -> 192.168.146.130:52694 (192.168.146.130)
msf5 exploit(multi/handler) > sessions -1
[*] Starting interaction with 1...
ojndmeterpreter >
Whew, I thought this was something on just my machine. Y'all are awesome! :heart: