Metasploit mailing list archives

Bind Shell using WEBDAV exploit


From: joshuaperrymon at gmail.com (Josh L. Perrymon)
Date: Wed, 26 Apr 2006 14:29:45 +1000

Hey GUys,

When trying to exploit the WebDav using a bind shell I noticed it went
throught about 10 tries for the return address then said
"Got COnnection from x.x.x.x:xxx>127.0.0.1:33333
exiting bind handler

I notice 33333 is open on my local machine an I can telnet to it.. but as
soon as I enter a command it exits..

Is this expected behavior? SHould I use something like netcat to connect to
my localport?

Does anyone have a docs I can read on how this bind should work?

Thanks!

JP
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060426/1322e730/attachment.htm>


Current thread: