Metasploit mailing list archives

Re: passing LHOST IP on command line


From: "Oliver Kleinecke" <okleinecke () web de>
Date: Wed, 10 Nov 2010 12:40:44 +0100 (CET)

I`d suggest to use the windows/meterpreter/reverse_tcp_dns payload, set its LHOST-value to a dyndns-name and set up a 
dyndns-client on your listener-host.
Hope this helps =).
best regards
Oliver

-----Ursprüngliche Nachricht-----
Von: "Robin Wood" <robin () digininja org>
Gesendet: 10.11.2010 11:41:28
An: "Metasploit List" <framework () spool metasploit com>
Betreff: [framework] passing LHOST IP on command line

Is it possible to build a reverse meterpreter exe that will take its
LHOST as a command line argument rather than being hard coded?

The scenario I have is:

Got command line access to a windows box through the windows psexec
and managed to use tftp to bring files across to the compromised
machine. I'd like to have generic 32 and 64 bit exes stored on my tftp
server that I can copy across and then run them giving the IP of my
multi handler machine.

This just seems easier than having to compile a new exe on each job
because my IP is different every time.

Robin
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
___________________________________________________________
WEB.DE DSL Doppel-Flat ab 19,99 &euro;/mtl.! Jetzt auch mit 
gratis Notebook-Flat! http://produkte.web.de/go/DSL_Doppel_Flatrate/2
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: