Metasploit mailing list archives
Handeling multiple reverse shell sessions.
From: patrick at aushack.com (Patrick Webster)
Date: Wed, 17 Oct 2007 21:17:54 +1000
Hi Abhie, Metasploit Framework uses an internal handler to manage sessions. Take a look at: http://www.metasploit.com/svn/framework3/trunk/lib/msf/core/handler/ e.g. http://www.metasploit.com/svn/framework3/trunk/lib/msf/core/handler/reverse_tcp.rb It is simply a Ruby socket. You won't be able to use MSF and Netcat together as they would compete for the same port. If you generate a reverse shell payload with LPORT 12345, such as standalone exploits often do: $ nc -v -l -p 12345 listening on [any] 12345 ... ... should listen for the shell to be returned. -Patrick -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071017/65966998/attachment.htm>
Current thread:
- Handeling multiple reverse shell sessions. Abhijeet Hatekar (Oct 17)
- Handeling multiple reverse shell sessions. Patrick Webster (Oct 17)
- Handeling multiple reverse shell sessions. mmiller at hick.org (Oct 17)
- Handeling multiple reverse shell sessions. Abhijeet Hatekar (Oct 17)
- Handeling multiple reverse shell sessions. Cyberheb (Oct 19)
- Handeling multiple reverse shell sessions. Abhijeet Hatekar (Oct 19)
- Handeling multiple reverse shell sessions. mmiller at hick.org (Oct 17)
- Handeling multiple reverse shell sessions. Patrick Webster (Oct 17)