Metasploit mailing list archives
Bind Shell using WEBDAV exploit
From: joshuaperrymon at gmail.com (Josh L. Perrymon)
Date: Wed, 26 Apr 2006 14:29:45 +1000
Hey GUys, When trying to exploit the WebDav using a bind shell I noticed it went throught about 10 tries for the return address then said "Got COnnection from x.x.x.x:xxx>127.0.0.1:33333 exiting bind handler I notice 33333 is open on my local machine an I can telnet to it.. but as soon as I enter a command it exits.. Is this expected behavior? SHould I use something like netcat to connect to my localport? Does anyone have a docs I can read on how this bind should work? Thanks! JP -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060426/1322e730/attachment.htm>
Current thread:
- Bind Shell using WEBDAV exploit Josh L. Perrymon (Apr 25)
- Bind Shell using WEBDAV exploit H D Moore (Apr 25)