Skip to content

Commit d6b5224

Browse files
committed
Meterpreter's sniffer extension freezes 64-bit systems
Meterpreter's priv extension is loaded by default since Metasploit 3.5 or so. There is no shellcodeexec 64-bit yet, anyway as the Metasploit payload is encoded with a 32-bit encoded (alphanumeric), it's all fine.
1 parent 5a1c9a4 commit d6b5224

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

lib/takeover/metasploit.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -414,8 +414,8 @@ def __loadMetExtensions(self, proc, metSess):
414414

415415
proc.stdin.write("use espia\n")
416416
proc.stdin.write("use incognito\n")
417-
proc.stdin.write("use priv\n")
418-
proc.stdin.write("use sniffer\n")
417+
# NOTE: this extension freezes the connection on 64-bit systems
418+
#proc.stdin.write("use sniffer\n")
419419
proc.stdin.write("sysinfo\n")
420420
proc.stdin.write("getuid\n")
421421

@@ -540,7 +540,7 @@ def uploadShellcodeexec(self, web=False):
540540
self.shellcodeexecLocal = paths.SQLMAP_SEXEC_PATH
541541

542542
if Backend.isOs(OS.WINDOWS):
543-
self.shellcodeexecLocal += "/windows/shellcodeexec.x%s.exe" % Backend.getArch()
543+
self.shellcodeexecLocal += "/windows/shellcodeexec.x%s.exe" % "32"
544544
else:
545545
self.shellcodeexecLocal += "/linux/shellcodeexec.x%s" % Backend.getArch()
546546

0 commit comments

Comments
 (0)