Metasploit mailing list archives

Reverse shell bind payload


From: norma.snockers at hotmail.co.uk (Norma Snockers)
Date: Thu, 8 Nov 2007 08:10:21 -0000

That's very true, but I always think it gives an element of pzazz purely for 
display/demonstration purposes.

The audience can 'see' what is being done and how rather than taking your 
word that Metasploit is doing it.

Your esteem will be greatly increased  :o)

Of course if someone does not know how to add via command line, Metasploit 
comes in doubly useful.


----- Original Message -----
From: <mmiller at hick.org>
To: <framework at metasploit.com>
Sent: Thursday, November 08, 2007 7:08 AM
Subject: Re: [framework] Reverse shell bind payload

On Thu, Nov 08, 2007 at 07:08:28AM -0000, Norma Snockers wrote:
Why don't you ensure that the target has remote desktop enabled

OP might also consider using the vncinject or meterpreter payloads... :)




Current thread: