Metasploit mailing list archives
db_autopwn: Determining what exploit gained a shell
From: version5 at gmail.com (nnp)
Date: Sat, 12 May 2007 05:47:24 -0700
Cheers, should have realised that. On a slightly related note, is there a way to specify a payload besides the reverse shell/bind shell? e.g the windows upload and exec payload? If not is there a reason there isnt or is it just no-one has got around to doing it yet? If its the latter, i've exams coming up and there's nothing quite like pending exams to spur you into coding something completely unrelated ;) Later, nnp On 5/11/07, mmiller at hick.org <mmiller at hick.org> wrote:
On Fri, May 11, 2007 at 06:06:43PM -0700, nnp wrote:Hey guys, Is there anyway (besides looking over the db_autopwn output, which isnt pretty ;) )to determine which of the exploits gained the session which is displayed via sessions -l?sessions -l -v
-- http://www.smashthestack.org http://www.mastersofthewang.com
Current thread:
- db_autopwn: Determining what exploit gained a shell nnp (May 11)
- db_autopwn: Determining what exploit gained a shell mmiller at hick.org (May 11)
- db_autopwn: Determining what exploit gained a shell nnp (May 12)
- db_autopwn: Determining what exploit gained a shell The KiLLeR MaF!a (May 12)
- db_autopwn: Determining what exploit gained a shell nnp (May 12)
- db_autopwn: Determining what exploit gained a shell H D Moore (May 12)
- How do I disconnect without causing an exploit to fail Randy Flood (May 13)
- db_autopwn: Determining what exploit gained a shell nnp (May 13)
- db_autopwn: Determining what exploit gained a shell nnp (May 12)
- db_autopwn: Determining what exploit gained a shell mmiller at hick.org (May 11)