Metasploit mailing list archives

db_autopwn: Determining what exploit gained a shell


From: version5 at gmail.com (nnp)
Date: Sat, 12 May 2007 05:47:24 -0700

Cheers, should have realised that.

On a slightly related note, is there a way to specify a payload
besides the reverse shell/bind shell? e.g the windows upload and exec
payload? If not is there a reason there isnt or is it just no-one has
got around to doing it yet? If its the latter, i've exams coming up
and there's nothing quite like pending exams to spur you into coding
something completely unrelated ;)

Later,
nnp

On 5/11/07, mmiller at hick.org <mmiller at hick.org> wrote:
On Fri, May 11, 2007 at 06:06:43PM -0700, nnp wrote:
Hey guys,
Is there anyway (besides looking over the db_autopwn output, which
isnt pretty ;) )to determine which of the exploits gained the session
which is displayed via sessions -l?

sessions -l -v



-- 
http://www.smashthestack.org
http://www.mastersofthewang.com



Current thread: