Metasploit mailing list archives
Re: Unsuccessful connection after successful exploit
From: Patrick Webster <patrick () aushack com>
Date: Fri, 12 Feb 2010 17:20:27 +1100
Depends on what you're attacking, but I had a similar issue with my NTP module. I had to add: 'PrependEncoder' => Metasm::Shellcode.assemble(Metasm::Ia32.new, "xor eax,eax mov al,27 int 0x80").encode_string, # alarm(0) to prevent the NTP timer from killing the fork thereby leaving the payload running. Strace is your friend >:) -Patrick _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Unsuccessful connection after successful exploit Eloi Sanfèlix (Feb 11)
- Re: Unsuccessful connection after successful exploit HD Moore (Feb 11)
- Re: Unsuccessful connection after successful exploit Eloi Sanfèlix (Feb 11)
- Re: Unsuccessful connection after successful exploit Patrick Webster (Feb 11)
- Re: Unsuccessful connection after successful exploit Eloi Sanfèlix (Feb 11)
- Re: Unsuccessful connection after successful exploit HD Moore (Feb 11)