Metasploit mailing list archives
Ad: Re: Backtrack 5r1 Metasploit opens two identical sessions
From: Jonny Tobiassen <jonny.tobiassen () hikt no>
Date: Mon, 16 Jan 2012 14:04:19 +0100
hehe, thats not the problem. Fra: HD Moore <hdm () metasploit com> Til: framework () spool metasploit com Dato: 13.01.2012 18:38 Emne: Re: [framework] Backtrack 5r1 Metasploit opens two identical sessions Sendt av: framework-bounces () spool metasploit com On 1/13/2012 3:25 AM, Jonny Tobiassen wrote:
Hello, When using BT5r1 metasploit always open two sessions like included
example.
Msf is version 4.2.0-dev. sf exploit(handler) > [*] Started reverse handler on 192.168.2.112:8081 [*] Starting the payload handler... [*] Sending stage (752128 bytes) to 192.168.2.105 [*] Meterpreter session 1 opened (192.168.2.112:443 -> 192.168.2.105:63141) at 2012-01-13 09:15:38 +0100 [*] Sending stage (752128 bytes) to 192.168.2.105 [*] Meterpreter session 2 opened (192.168.2.112:443 -> 192.168.2.105:63183) at 2012-01-13 09:15:43 +0100
Don't click the EXE twice? _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Backtrack 5r1 Metasploit opens two identical sessions Jonny Tobiassen (Jan 13)
- Re: Backtrack 5r1 Metasploit opens two identical sessions HD Moore (Jan 13)
- Ad: Re: Backtrack 5r1 Metasploit opens two identical sessions Jonny Tobiassen (Jan 16)
- Re: Backtrack 5r1 Metasploit opens two identical sessions HD Moore (Jan 13)