-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
post/windows/gather/checkvm returns a bad result on java meterpreter #6149
Comments
I think we need to implement the rest of the registry meterpreter commands in PHP for this to work properly. |
Hi! This issue has been left open with no activity for a while now. We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request. |
Hi again! It’s been 60 days since anything happened on this issue, so we are going to close it. As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request. |
FWIW; this issue still exists with
Compared with compiled
|
Ive tested this on a Windows 10 1709 VM. Changes to Metasploit Framework made since this issue has been reported result in the VM being correctly identified however two warnings are shown: The output is the same for OpenJDK 8 and OpenJDK 9:
|
I haven't debugged fully, but I think this was fixed by #18210 - which added better command detection of Registry manipulation. Now we much more granularly detect which Registry functions are available and fall back to using the command shell when the Meterpreter doesn't support the functionality natively The warnings are caused by the mixin's requirements: metasploit-framework/lib/msf/core/post/windows/registry.rb Lines 58 to 70 in 90cf371
Completely out of scope: I'm guessing technically we could remove those Meterpreter command requirements - or maybe mark them as hard/soft requirements for modules |
Target: Windows XPSP3, default administrator privileges session
The text was updated successfully, but these errors were encountered: