Metasploit mailing list archives

Handeling multiple reverse shell sessions.


From: patrick at aushack.com (Patrick Webster)
Date: Wed, 17 Oct 2007 21:17:54 +1000

Hi Abhie,

Metasploit Framework uses an internal handler to manage sessions.

Take a look at:

http://www.metasploit.com/svn/framework3/trunk/lib/msf/core/handler/

e.g.

http://www.metasploit.com/svn/framework3/trunk/lib/msf/core/handler/reverse_tcp.rb

It is simply a Ruby socket. You won't be able to use MSF and Netcat together
as they would compete for the same port.

If you generate a reverse shell payload with LPORT 12345, such as standalone
exploits often do:

$ nc -v -l -p 12345
listening on [any] 12345 ...

... should listen for the shell to be returned.

-Patrick
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071017/65966998/attachment.htm>


Current thread: