Metasploit mailing list archives

use of meterpreter (copy for the list )


From: mmiller at hick.org (mmiller at hick.org)
Date: Fri, 15 Apr 2005 10:29:43 -0500

On Fri, Apr 15, 2005 at 09:53:46AM +0200, Thomas Werth wrote:
just tried that out, startet exploit set portfwd right after
[*] Connected to REMACT with group ID 0xef52
is shown, but still no luck :(

Does the bind handler ever say it established the connection?  Does it
say this before or after the 'Connected to REMACT'?  If it says that the
bind handler has established the connection before the 'REMACT' line
then you may have created the port forward too soon.  Can you include
the full output from the exploit command?

Would it be better to do a reverse bind ?
How would i set this up ?

Right now there is no support for reverse port forwards (where the
server listens on a port and proxies connections back to the client).
The only payloads you can use with port forwarding are the bind and
findsock style payloads.



Current thread: