Metasploit mailing list archives

Problem with LHOST on exploits.


From: anastasiosm at gmail.com (Anastasios Monachos)
Date: Tue, 14 Apr 2009 12:23:43 +0100

Yes your IP it is included in 0.0.0.0 like I said 0.0.0.0 is anything, but
you can easily test it to see if it is working. Please give it a go, prepare
your listening server as you did run your exploit on the victim, check the
results.

Tasos

2009/4/14 Professor 0110 <professor0110 at gmail.com>

Thanks for the quick reply and help Anastasios!

But even with 0.0.0.0 is LHOST still set to my IP address which I
specified?


On Tue, Apr 14, 2009 at 9:06 PM, Anastasios Monachos <
anastasiosm at gmail.com> wrote:

This is normal, nothing to worry about. 0.0.0.0 means every ip address.

When you have a server usually you can set it up to listen on a specific
IP address/interface or you can set it to listen on every interface/ip your
system may support, the last option is defined by using 0.0.0.0.

Hope that is clear enough.

2009/4/14 Professor 0110 <professor0110 at gmail.com>

 Hi all,

Whenever I attempt to use an exploit with a payload and I execute the
exploit, the output shows the following:

[*] Handler binding to LHOST 0.0.0.0

Why does it do that when I've explicitly stated the LHOST for the
particular payload/exploit?

Ant help on this matter will be greatly appreciated!

Oh yeah, I'm using Ubuntu 8.10.

Cheers,

Professor 0110

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework




--
AM
Key ID: 0x5EB17EE7





-- 
AM
Key ID: 0x5EB17EE7
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090414/79fe12f8/attachment.htm>


Current thread: