Metasploit mailing list archives
Problem with LHOST on exploits.
From: professor0110 at gmail.com (Professor 0110)
Date: Wed, 15 Apr 2009 17:24:02 +1000
But if you can connect to the victim via ping or web browser, then certainly LHOST would be routable from the victim address? On Wed, Apr 15, 2009 at 4:37 PM, Patrick Webster <patrick at aushack.com>wrote:
The LHOST value is what is encoded into the actual shellcode payload... So LHOST must be routable from the victim address, assuming it is vulnerable.
-------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090415/00f3bf12/attachment.htm>
Current thread:
- Problem with LHOST on exploits. Professor 0110 (Apr 14)
- Problem with LHOST on exploits. Anastasios Monachos (Apr 14)
- Problem with LHOST on exploits. Professor 0110 (Apr 14)
- Problem with LHOST on exploits. Anastasios Monachos (Apr 14)
- Problem with LHOST on exploits. egypt at metasploit.com (Apr 14)
- vulnerability discovery? jeffs (Apr 14)
- vulnerability discovery? Patrick Webster (Apr 14)
- Problem with LHOST on exploits. Professor 0110 (Apr 14)
- Problem with LHOST on exploits. Patrick Webster (Apr 14)
- Problem with LHOST on exploits. Professor 0110 (Apr 15)
- Problem with LHOST on exploits. egypt at metasploit.com (Apr 15)
- Message not available
- Problem with LHOST on exploits. Professor 0110 (Apr 15)
- Message not available
- Problem with LHOST on exploits. Professor 0110 (Apr 15)
- Problem with LHOST on exploits. Professor 0110 (Apr 14)
- Problem with LHOST on exploits. Anastasios Monachos (Apr 14)