Metasploit mailing list archives
Exploit::Remote::HttpClient and stages
From: hdm at metasploit.com (H D Moore)
Date: Sun, 25 Mar 2007 18:10:26 -0500
Are you calling the handler() function inside your module? On Sunday 25 March 2007 18:09, Nicob wrote:
In one of my exploit, findsock payloads never work. When capturing the trafic, I see the cmd.exe prompt which is correctly sent back over the previously established connection and the "echo" test done by _check_shell(), but msfcli didn't "catch" the shell :
Current thread:
- Exploit::Remote::HttpClient and stages Olivier Dembour (Mar 09)
- Exploit::Remote::HttpClient and stages mmiller at hick.org (Mar 09)
- Exploit::Remote::HttpClient and stages H D Moore (Mar 09)
- Exploit::Remote::HttpClient and stages Olivier Dembour (Mar 11)
- Exploit::Remote::HttpClient and stages Nicob (Mar 25)
- Exploit::Remote::HttpClient and stages H D Moore (Mar 25)
- Exploit::Remote::HttpClient and stages mmiller at hick.org (Mar 09)