Metasploit mailing list archives

wmf flaws...auto-restart the exploit?


From: hdm at metasploit.com (H D Moore)
Date: Wed, 4 Jan 2006 09:08:31 -0600

Oh, technically you can create multiple sessions with one exploit under 
2.x by using the 'NinjaDontKill' option (iirc), a non-staged payload 
(win32_reverse), and socketNinja.pl. This is 100% undocumented though :-)

-HD

On Tuesday 03 January 2006 18:48, Gianluigi "Zane" Zanettini wrote:
The problem is, the exploit quits after sending the payload (I'm using
win32_reverse_stg_upexec): is there any way to automatically restart
the webserver after that and get the exploit ready for another machine?



Current thread: