Metasploit mailing list archives
Exploit::Remote::HttpClient and stages
From: Olivier.Dembour at hsc.fr (Olivier Dembour)
Date: Sun, 11 Mar 2007 15:52:56 +0100
mmiller at hick.org a ?crit :
Just make sure that you call handler after you trigger the bug. This will grab the socket used by the global HTTP client connection and try to use that to stage the payload over. Let us know if you run into problems with this, since findsock payloads have thus far not been used all that much.
Thanks for your reply, HTTPClient handler works well with standard payloads (reverse tcp, exec). The problem is only with findsock like payload -- Olivier Dembour ++ Olivier.Dembour at hsc.fr Herv? Schauer Consultants -- http://www.hsc.fr/
Current thread:
- Exploit::Remote::HttpClient and stages Olivier Dembour (Mar 09)
- Exploit::Remote::HttpClient and stages mmiller at hick.org (Mar 09)
- Exploit::Remote::HttpClient and stages H D Moore (Mar 09)
- Exploit::Remote::HttpClient and stages Olivier Dembour (Mar 11)
- Exploit::Remote::HttpClient and stages Nicob (Mar 25)
- Exploit::Remote::HttpClient and stages H D Moore (Mar 25)
- Exploit::Remote::HttpClient and stages mmiller at hick.org (Mar 09)