Metasploit mailing list archives

Re: newbie backdoor issue


From: SuNeEl <seacore14 () yahoo com>
Date: Sat, 23 Jan 2010 16:24:09 +0530 (IST)

thanx HD 

working on local network but in case we test setup on internet it's does not work , and must not work because there are 
plenty of devices(nature on internet) between two host(attacker & target) and following that target again is not 
possible as backdoor.

seeking such testing that allows target host to connect back to attacker's host irrelevant where target is located.As 
attacker listing on particular port for target to connect to. certainly it shall eliminate the issue of NAT etc between 
two hosts.

lil guide n help highly appreciated from community .  

--

Happiness is like a Butterfly...


--- On Fri, 22/1/10, HD Moore <hdm () metasploit com> wrote:

From: HD Moore <hdm () metasploit com>
Subject: Re: [framework] newbie backdoor issue
To: framework () spool metasploit com
Date: Friday, 22 January, 2010, 7:13 PM

On 1/22/2010 6:23 AM, SuNeEl wrote:
"msf exploit(handler) > set RHOST 192.168.0.9
RHOST => 192.168.0.9"

while connect backdoor rhost can be changed if dhcp there what's then ?


If you installed metsvc and the target system changed IPs, you would
have to scan the network looking for the port. Alternatively, use the
"persistence" script in Meterpreter and configure it to reverse connect.
Either way, make sure you disable the metsvc/persistent agent when you
are done with the test.

-HD
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework



      The INTERNET now has a personality. YOURS! See your Yahoo! Homepage. http://in.yahoo.com/
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: