Metasploit mailing list archives

Re: newbie backdoor issue


From: HD Moore <hdm () metasploit com>
Date: Fri, 22 Jan 2010 07:43:42 -0600

On 1/22/2010 6:23 AM, SuNeEl wrote:
"msf exploit(handler) > set RHOST 192.168.0.9
RHOST => 192.168.0.9"

while connect backdoor rhost can be changed if dhcp there what's then ?


If you installed metsvc and the target system changed IPs, you would
have to scan the network looking for the port. Alternatively, use the
"persistence" script in Meterpreter and configure it to reverse connect.
Either way, make sure you disable the metsvc/persistent agent when you
are done with the test.

-HD
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: