Metasploit mailing list archives

Exploit::Remote::HttpClient and stages


From: hdm at metasploit.com (H D Moore)
Date: Sun, 25 Mar 2007 18:10:26 -0500

Are you calling the handler() function inside your module?

On Sunday 25 March 2007 18:09, Nicob wrote:
In one of my exploit, findsock payloads never work. When capturing the
trafic, I see the cmd.exe prompt which is correctly sent back over the
previously established connection and the "echo" test done by
_check_shell(), but msfcli didn't "catch" the shell :



Current thread: