Metasploit mailing list archives

console with arguments


From: jerome.athias at free.fr (Jerome Athias)
Date: Fri, 04 May 2007 22:37:02 +0200

Quite tricky but it does the job:
http://127.0.0.1:55555/exploits/config?refname=windows:http:navicopa_get_overflow&payload=16&step=config&target=0&eopt_RHOST=127.0.0.1&eopt_RPORT=80&popt_CMD=calc.exe&eopt_CHOST=";><script>window.location="http://127.0.0.1:55555/console/index/0";;</script>


inbox-sc1 a ?crit :
I'd like to be able to open a MSF console
all by itself (not within the broader MSF web
console with the tool bar etc.) and supply the
console with all the necessary parameters to
run an exploit. Something like:

http://127.0.0.1:55555/console?refname=windows%3Aarkeia%3Atype77&;
step=exploit&target=2&payload=4&RHOST=127.0.0.1&RPORT=617&EXITFUNC=seh&PASS=
pass&USER=foo

What I have tried complains about there not being
an open session.

- Bill




  



Current thread: