Git Product home page Git Product logo

Comments (4)

GoogleCodeExporter avatar GoogleCodeExporter commented on September 26, 2024
Disregard.
I did not realize I needed to "wait" until I received UID information before 
proceeding.  All is well.

Good job on Armitage ... I really enjoy using this graphical tool when teaching 
new security students.

Original comment by [email protected] on 26 Mar 2011 at 2:35

from armitage.

GoogleCodeExporter avatar GoogleCodeExporter commented on September 26, 2024
I *greatly* enjoy the fact that you're using it to teach new students. Thanks 
for following up and closing the loop here. -- Raphael

Original comment by [email protected] on 26 Mar 2011 at 1:20

  • Changed state: Invalid

from armitage.

GoogleCodeExporter avatar GoogleCodeExporter commented on September 26, 2024
What do you mean "wait" until you receive UID? I've successfully exploited a 
target, and after 2 minutes, the help command still does not bring back 
relevant commands.

Original comment by [email protected] on 16 Feb 2012 at 9:42

from armitage.

GoogleCodeExporter avatar GoogleCodeExporter commented on September 26, 2024
@alton.jx - I'm referring to the information displayed below the compromised 
target. If you successfully exploit a Windows system, you will see something 
like NT AUTHORITY @ SOMESYSTEM below the IP address. When you see this, you're 
done waiting.

This should happen pretty quickly (a few seconds). If it doesn't happen, 
contrary to popular belief, waiting won't solve this problem. It's kind of the 
hacker equivalent of speaking english louder and louder hoping a non-native 
speaker will understand or throwing the same SMB exploit against a Windows 7 
host hoping that.... this time, maybe--access will come.

If you can't enter *any* commands:

It sounds like your session becomes established but it never finishes syncing. 
Try rebooting your target. Remember, you're likely exploiting a memory 
corruption bug. If the memory is already corrupted or in some odd state--your 
attack (or post-exploitation kit) won't work.

If *some* commands are missing but a few basic things are present:

Then it sounds like Meterpreter didn't load the stdapi and priv modules. Type: 
use priv and use stdapi to load these by hand. These are DLLs that Meterpreter 
injects into memory on establishing a session (usually). Armitage is smart 
enough, that if you try to do something through a menu and it doesn't work, 
it'll issue these use commands for you. (The command may be load now, I think 
this changed recently in Metasploit)

So, that long explanation is what I mean by "wait" until you receive a UID.

Original comment by [email protected] on 16 Feb 2012 at 9:57

from armitage.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.